Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:780216
MD5:635e3f021a205ad3a2bf9aaf3d278251
SHA1:c4efd1650fe3bde0bcba9ad2772b451b49809ef4
SHA256:ff69d65d2eacb1bd14db2d94e9dd720aa66a5ef3d108a08d5afe8a3166305617
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Machine Learning detection for sample
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • file.exe (PID: 3620 cmdline: C:\Users\user\Desktop\file.exe MD5: 635E3F021A205AD3A2BF9AAF3D278251)
    • explorer.exe (PID: 3528 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • EE5A.exe (PID: 916 cmdline: C:\Users\user\AppData\Local\Temp\EE5A.exe MD5: 49D7D06EB3FD5E1DADAA505C021AA571)
        • rundll32.exe (PID: 5616 cmdline: "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • F50.exe (PID: 1244 cmdline: C:\Users\user\AppData\Local\Temp\F50.exe MD5: 47D4D75F4D1D3B2C16D375A671BF0FDC)
  • wdscede (PID: 6128 cmdline: C:\Users\user\AppData\Roaming\wdscede MD5: 635E3F021A205AD3A2BF9AAF3D278251)
  • F50.exe (PID: 6044 cmdline: "C:\Users\user\AppData\Local\Temp\F50.exe" MD5: 47D4D75F4D1D3B2C16D375A671BF0FDC)
  • cleanup
{"C2 list": ["http://skinndia.com/tmp/", "http://cracker.biz/tmp/", "http://piratia-life.ru/tmp/"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.422927170.0000000002DA9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x4346:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x344:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x344:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 19 entries
      SourceRuleDescriptionAuthorStrings
      0.3.file.exe.2d30000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        4.2.wdscede.2bd0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          0.2.file.exe.2c00e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            4.2.wdscede.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 5 entries
                No Sigma rule has matched
                Timestamp:192.168.2.4211.119.84.11249697802851815 01/08/23-16:15:21.659638
                SID:2851815
                Source Port:49697
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.458.235.189.19249696802851815 01/08/23-16:15:19.707702
                SID:2851815
                Source Port:49696
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: file.exeReversingLabs: Detection: 46%
                Source: file.exeVirustotal: Detection: 52%Perma Link
                Source: http://194.135.33.42/intel.exeAvira URL Cloud: Label: malware
                Source: vatra.atVirustotal: Detection: 5%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeVirustotal: Detection: 47%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\Wtfoiq.tmpReversingLabs: Detection: 40%
                Source: C:\Users\user\AppData\Roaming\wdscedeReversingLabs: Detection: 46%
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\F50.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\wdscedeJoe Sandbox ML: detected
                Source: 12.2.F50.exe.4a6512c.2.unpackAvira: Label: TR/Patched.Ren.Gen7
                Source: 5.2.EE5A.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
                Source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://skinndia.com/tmp/", "http://cracker.biz/tmp/", "http://piratia-life.ru/tmp/"]}
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004AA034 CryptCreateHash,GetTempPathW,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A604F CryptCreateHash,CryptCreateHash,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A2015 CryptGenKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004DA0DA CryptDestroyHash,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A715D CryptDestroyHash,WSAStartup,CryptReleaseContext,CryptReleaseContext,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B121F CryptGenKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A32B3 CryptGenKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004AD36A CryptGenKey,CryptExportKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004D23B8 CryptReleaseContext,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_0047953C CryptGenKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004E55F9 RegSetValueExW,CryptDestroyHash,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_0048766C CryptDestroyHash,GetProcAddress,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A06C7 CryptDestroyKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004AE87C CryptExportKey,CryptDestroyKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B9952 CryptAcquireContextA,CryptAcquireContextA,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004AD9ED CreateToolhelp32Snapshot,CryptBinaryToStringA,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004C49F4 CryptGenKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B99AA CryptImportKey,CryptImportKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A5A46 CryptBinaryToStringA,CryptBinaryToStringA,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B9A3F CryptEncrypt,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B9AC3 CryptDestroyKey,CryptDestroyKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B9AD7 CryptReleaseContext,CryptReleaseContext,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_00499BD0 CryptDestroyKey,GetProcAddress,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004BBBE5 CryptDestroyHash,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004EAB82 CryptDestroyKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004C9C5B CryptReleaseContext,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004D3C6F CryptDestroyKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004C6CE7 CryptDestroyKey,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B9C88 CryptBinaryToStringA,

                Exploits

                barindex
                Source: Yara matchFile source: 6.2.F50.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.F50.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000002.567433680.0000000000413000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.528207435.0000000000413000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY

                Compliance

                barindex
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeUnpacked PE file: 5.2.EE5A.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\F50.exeUnpacked PE file: 6.2.F50.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\F50.exeUnpacked PE file: 12.2.F50.exe.400000.0.unpack
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: unknownHTTPS traffic detected: 5.135.247.111:443 -> 192.168.2.4:49701 version: TLS 1.2
                Source: Binary string: c:\omtnkdoj\bnwv\yogisfk\cqf.pdb source: F50.exe, 00000006.00000002.528181766.0000000000410000.00000040.00000001.01000000.00000008.sdmp, F50.exe, 0000000C.00000002.567417661.0000000000410000.00000040.00000001.01000000.00000008.sdmp
                Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb source: F50.exe, 0000000C.00000002.569153317.0000000002F10000.00000004.00000020.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\donupuvip.pdb source: F50.exe, 00000006.00000000.483025298.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe, 0000000C.00000000.525499215.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe.1.dr
                Source: Binary string: C:\donupuvip.pdb source: F50.exe, 00000006.00000000.483025298.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe, 0000000C.00000000.525499215.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe.1.dr
                Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb source: F50.exe, 0000000C.00000002.569572014.0000000004A5F000.00000004.00000800.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb/; source: F50.exe, 0000000C.00000002.569153317.0000000002F10000.00000004.00000020.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb/; source: F50.exe, 0000000C.00000002.569572014.0000000004A5F000.00000004.00000800.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\nodisexu yavagehinup25\lore6 waciropa\jasat.pdb source: file.exe, wdscede.1.dr
                Source: Binary string: C:\cotuzupax\penoriyupu\bodukik-pom6.pdb source: EE5A.exe, 00000005.00000000.475912939.0000000000401000.00000020.00000001.01000000.00000007.sdmp, EE5A.exe.1.dr
                Source: Binary string: CC:\cotuzupax\penoriyupu\bodukik-pom6.pdb source: EE5A.exe, 00000005.00000000.475912939.0000000000401000.00000020.00000001.01000000.00000007.sdmp, EE5A.exe.1.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 194.135.33.42 80
                Source: C:\Windows\explorer.exeDomain query: vatra.at
                Source: C:\Windows\explorer.exeDomain query: degroeneuitzender.nl
                Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.4:49696 -> 58.235.189.192:80
                Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.4:49697 -> 211.119.84.112:80
                Source: Malware configuration extractorURLs: http://skinndia.com/tmp/
                Source: Malware configuration extractorURLs: http://cracker.biz/tmp/
                Source: Malware configuration extractorURLs: http://piratia-life.ru/tmp/
                Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
                Source: Joe Sandbox ViewIP Address: 5.135.247.111 5.135.247.111
                Source: Joe Sandbox ViewIP Address: 187.170.238.164 187.170.238.164
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0Date: Sun, 08 Jan 2023 15:15:22 GMTContent-Type: application/octet-streamContent-Length: 1073152Last-Modified: Sun, 08 Jan 2023 15:10:03 GMTConnection: keep-aliveETag: "63badccb-106000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 f7 df 75 fd b3 be 1b ae b3 be 1b ae b3 be 1b ae 0e f1 8d ae b2 be 1b ae ad ec 8e ae af be 1b ae ad ec 98 ae cc be 1b ae 94 78 60 ae b4 be 1b ae b3 be 1a ae 31 be 1b ae ad ec 9f ae 90 be 1b ae ad ec 8f ae b2 be 1b ae ad ec 8a ae b2 be 1b ae 52 69 63 68 b3 be 1b ae 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 65 09 e0 61 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 7a 01 00 00 b0 85 02 00 00 00 00 bf 5f 00 00 00 10 00 00 00 90 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 e0 86 02 00 04 00 00 2f c8 10 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ec 7d 01 00 50 00 00 00 00 50 85 02 60 84 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 12 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 43 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 d4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 66 78 01 00 00 10 00 00 00 7a 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 34 b7 83 02 00 90 01 00 00 5c 0d 00 00 7e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 84 01 00 00 50 85 02 00 86 01 00 00 da 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Source: global trafficHTTP traffic detected: GET /systems/index.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: degroeneuitzender.nl
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nrunfbf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://utbgbuc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 298Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://laatdiy.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 235Host: vatra.at
                Source: global trafficHTTP traffic detected: GET /intel.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 194.135.33.42
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://avjruv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 149Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fpmhvdgw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 262Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://daffyjk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 136Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lubvvjyufy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 334Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tklmgewyg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gttbvxrpx.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 294Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qsmspqgdlg.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 175Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wgdttq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 332Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dotemlc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 110Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://utctbvv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 300Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tduhcp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 181Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mwrunlqeb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 255Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://npcojlss.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 339Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yokcj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lrmfyx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 333Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wemmwd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 331Host: vatra.at
                Source: global trafficHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ursbcr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 355Host: vatra.at
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: unknownTCP traffic detected without corresponding DNS query: 194.135.33.42
                Source: explorer.exe, 00000001.00000000.393736698.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.419303004.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.362501774.0000000008260000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST /tmp/ HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nrunfbf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: vatra.at
                Source: unknownDNS traffic detected: queries for: vatra.at
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004C9255 InternetReadFile,
                Source: global trafficHTTP traffic detected: GET /systems/index.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: degroeneuitzender.nl
                Source: global trafficHTTP traffic detected: GET /intel.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 194.135.33.42
                Source: unknownHTTPS traffic detected: 5.135.247.111:443 -> 192.168.2.4:49701 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 0.3.file.exe.2d30000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wdscede.2bd0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c00e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wdscede.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.3.wdscede.2be0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.587334500.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.327713150.0000000002D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.570683568.0000000002BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.586404126.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.422685888.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: F50.exe, 00000006.00000002.533600256.0000000002E9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B99AA CryptImportKey,CryptImportKey,

                System Summary

                barindex
                Source: 6.2.F50.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 12.2.F50.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.422927170.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000004.00000002.587334500.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000C.00000002.568515234.0000000002E8E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000005.00000002.521464355.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000004.00000002.586404126.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000C.00000002.568347439.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000005.00000002.520261780.0000000004997000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000006.00000002.536404249.0000000004830000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000000.00000002.422685888.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.422539917.0000000002C00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000004.00000002.586888838.0000000002C38000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000004.00000002.586363495.0000000002BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000006.00000002.534093898.0000000002EA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 6.2.F50.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 12.2.F50.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.422927170.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000004.00000002.587334500.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000C.00000002.568515234.0000000002E8E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000005.00000002.521464355.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000004.00000002.586404126.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000C.00000002.568347439.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000005.00000002.520261780.0000000004997000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000006.00000002.536404249.0000000004830000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000000.00000002.422685888.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.422539917.0000000002C00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000004.00000002.586888838.0000000002C38000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000004.00000002.586363495.0000000002BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000006.00000002.534093898.0000000002EA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409466
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412670
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00415482
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041212C
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E9E6
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411BE8
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040D995
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00409466
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00412670
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00415482
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_0041212C
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_0040E9E6
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00411BE8
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_0040D995
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004D1370
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004E9303
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004E55F9
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004FA940
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004E8DF6
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401615 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040280D NtClose,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401620 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403428 GetModuleHandleA,Sleep,GetModuleFileNameW,ExpandEnvironmentStringsW,lstrcatW,CreateFileW,MapViewOfFile,LocalFree,GetForegroundWindow,NtOpenProcess,NtQueryKey,NtEnumerateKey,strstr,wcsstr,tolower,towlower,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401633 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401636 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004026C4 NtClose,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004017E4 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040159D NtAllocateVirtualMemory,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00401615 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_0040280D NtClose,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00401620 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00403428 GetModuleHandleA,Sleep,GetModuleFileNameW,ExpandEnvironmentStringsW,lstrcatW,CreateFileW,MapViewOfFile,LocalFree,GetForegroundWindow,NtOpenProcess,NtQueryKey,NtEnumerateKey,strstr,wcsstr,tolower,towlower,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00401633 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00401636 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_004026C4 NtClose,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_004017E4 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_0040159D NtAllocateVirtualMemory,
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: dpapi.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dll
                Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp D0AC0E9021C6E231C60256198309B7F72CE4C5E772CF343B5456C2CE0664B9BD
                Source: file.exeReversingLabs: Detection: 46%
                Source: file.exeVirustotal: Detection: 52%
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\wdscede C:\Users\user\AppData\Roaming\wdscede
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\EE5A.exe C:\Users\user\AppData\Local\Temp\EE5A.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F50.exe C:\Users\user\AppData\Local\Temp\F50.exe
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\F50.exe "C:\Users\user\AppData\Local\Temp\F50.exe"
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\EE5A.exe C:\Users\user\AppData\Local\Temp\EE5A.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F50.exe C:\Users\user\AppData\Local\Temp\F50.exe
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wdscedeJump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\EE5A.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@9/5@21/9
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004BC614 CreateToolhelp32Snapshot,CreateToolhelp32Snapshot,
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
                Source: C:\Users\user\AppData\Local\Temp\F50.exeMutant created: \Sessions\1\BaseNamedObjects\WTfewgNmxpcaVXHKTu
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: c:\omtnkdoj\bnwv\yogisfk\cqf.pdb source: F50.exe, 00000006.00000002.528181766.0000000000410000.00000040.00000001.01000000.00000008.sdmp, F50.exe, 0000000C.00000002.567417661.0000000000410000.00000040.00000001.01000000.00000008.sdmp
                Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb source: F50.exe, 0000000C.00000002.569153317.0000000002F10000.00000004.00000020.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\donupuvip.pdb source: F50.exe, 00000006.00000000.483025298.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe, 0000000C.00000000.525499215.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe.1.dr
                Source: Binary string: C:\donupuvip.pdb source: F50.exe, 00000006.00000000.483025298.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe, 0000000C.00000000.525499215.0000000000401000.00000020.00000001.01000000.00000008.sdmp, F50.exe.1.dr
                Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb source: F50.exe, 0000000C.00000002.569572014.0000000004A5F000.00000004.00000800.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb/; source: F50.exe, 0000000C.00000002.569153317.0000000002F10000.00000004.00000020.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb/; source: F50.exe, 0000000C.00000002.569572014.0000000004A5F000.00000004.00000800.00020000.00000000.sdmp, F50.exe, 0000000C.00000002.648280512.0000000007493000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\nodisexu yavagehinup25\lore6 waciropa\jasat.pdb source: file.exe, wdscede.1.dr
                Source: Binary string: C:\cotuzupax\penoriyupu\bodukik-pom6.pdb source: EE5A.exe, 00000005.00000000.475912939.0000000000401000.00000020.00000001.01000000.00000007.sdmp, EE5A.exe.1.dr
                Source: Binary string: CC:\cotuzupax\penoriyupu\bodukik-pom6.pdb source: EE5A.exe, 00000005.00000000.475912939.0000000000401000.00000020.00000001.01000000.00000007.sdmp, EE5A.exe.1.dr

                Data Obfuscation

                barindex
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeUnpacked PE file: 5.2.EE5A.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\F50.exeUnpacked PE file: 6.2.F50.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\F50.exeUnpacked PE file: 12.2.F50.exe.400000.0.unpack
                Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\wdscedeUnpacked PE file: 4.2.wdscede.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeUnpacked PE file: 5.2.EE5A.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                Source: C:\Users\user\AppData\Local\Temp\F50.exeUnpacked PE file: 6.2.F50.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                Source: C:\Users\user\AppData\Local\Temp\F50.exeUnpacked PE file: 12.2.F50.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402DB9 push esi; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004091F5 push ecx; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02C02E20 push esi; ret
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_00402DB9 push esi; ret
                Source: C:\Users\user\AppData\Roaming\wdscedeCode function: 4_2_004091F5 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004F81D6 push 004F5947h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004F81D6 push 004A7ED8h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004EC1B8 push 004B9C1Ah; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004D650F push 004D4937h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A8535 push 0049C91Ch; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_0046763A push 0045EEBAh; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004F6755 push 004B66B8h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004C8717 push 004A47B2h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004C8717 push 0049EEB0h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004D688A push 0045F957h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004EC8A7 push 004E3B24h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004AB8A4 push 004A93CBh; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A8A07 push 004A1DA9h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004F4B5F push edx; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_00463CD5 push 0045EEBAh; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004D7D4B push 004D5472h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004F8D9E push 004C1DDDh; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004F7E0B push 004DAA89h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004EBFDA push 004C6325h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004A6FF6 push 0049E758h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B004D push dword ptr [004FE19Fh]; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B1047 push 004A2674h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_00468048 push 00461400h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_0049305B push 0045F504h; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_004B0059 push dword ptr [004FE1CFh]; ret
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeCode function: 5_2_00489051 push 004618E3h; ret
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wdscedeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\EE5A.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F50.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeFile created: C:\Users\user\AppData\Local\Temp\Wtfoiq.tmpJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wdscedeJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wdscede:Zone.Identifier read attributes | delete
                Source: C:\Users\user\AppData\Local\Temp\F50.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\wdscedeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\wdscedeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\wdscedeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\wdscedeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\wdscedeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\wdscedeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\explorer.exe TID: 4192Thread sleep count: 637 > 30
                Source: C:\Windows\explorer.exe TID: 2952Thread sleep count: 1092 > 30
                Source: C:\Windows\explorer.exe TID: 2952Thread sleep time: -109200s >= -30000s
                Source: C:\Windows\explorer.exe TID: 4184Thread sleep count: 1115 > 30
                Source: C:\Windows\explorer.exe TID: 4184Thread sleep time: -111500s >= -30000s
                Source: C:\Windows\explorer.exe TID: 5188Thread sleep count: 550 > 30
                Source: C:\Windows\explorer.exe TID: 2088Thread sleep count: 672 > 30
                Source: C:\Windows\explorer.exe TID: 2088Thread sleep time: -67200s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\F50.exe TID: 4792Thread sleep time: -600000s >= -30000s
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\F50.exeThread delayed: delay time: 600000
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 637
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1092
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1115
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 550
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 672
                Source: C:\Users\user\AppData\Local\Temp\F50.exeFile opened: PHYSICALDRIVE0
                Source: C:\Users\user\AppData\Local\Temp\EE5A.exeAPI coverage: 7.8 %
                Source: C:\Windows\explorer.exeProcess information queried: ProcessInformation
                Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 136000
                Source: C:\Users\user\AppData\Local\Temp\F50.exeThread delayed: delay time: 600000
                Source: explorer.exe, 00000001.00000000.363064652.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000006
                Source: explorer.exe, 00000001.00000000.362954158.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000001.00000000.412581778.00000000059F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b
                Source: explorer.exe, 00000001.00000000.419969710.0000000008394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: F50.exe, 0000000C.00000002.569572014.0000000004A5F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vMCI,
                Source: explorer.exe, 00000001.00000000.396142843.000000000CDC8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&
                Source: F50.exe, 00000006.00000000.485963215.0000000002BE1000.00000002.00000001.01000000.00000008.sdmp, F50.exe, 0000000C.00000000.526838122.0000000002BE1000.00000002.00000001.01000000.00000008.sdmp, F50.exe.1.drBinary or memory string: ~kVOkVdsnqemU}
                Source: explorer.exe, 00000001.00000000.362954158.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000000
                Source: F50.exe, 0000000C.00000002.576900632.0000000005462000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: K,<=;;?9:VMcI;8
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02C00D90 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02C0092B mov eax, dword ptr fs:[00000030h]

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: wdscede.1.drJump to dropped file
                Source: C:\Windows\explorer.exeNetwork Connect: 194.135.33.42 80
                Source: C:\Windows\explorer.exeDomain query: vatra.at
                Source: C:\Windows\explorer.exeDomain query: degroeneuitzender.nl
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\wdscedeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\wdscedeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2A419E0
                Source: C:\Users\user\AppData\Roaming\wdscedeThread created: unknown EIP: 4C019E0
                Source: explorer.exe, 00000001.00000000.405860360.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.378018364.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.341647376.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Managerzx
                Source: explorer.exe, 00000001.00000000.405860360.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.378018364.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.382372011.0000000005C70000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000001.00000000.405860360.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.378018364.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.341647376.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000001.00000000.377617070.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.341516862.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.405341084.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanath
                Source: explorer.exe, 00000001.00000000.405860360.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.378018364.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.341647376.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.3.file.exe.2d30000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wdscede.2bd0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c00e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wdscede.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.3.wdscede.2be0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.587334500.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.327713150.0000000002D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.570683568.0000000002BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.586404126.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.422685888.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.3.file.exe.2d30000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wdscede.2bd0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c00e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wdscede.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.3.wdscede.2be0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.587334500.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.327713150.0000000002D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.570683568.0000000002BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.586404126.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.422685888.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                32
                Process Injection
                11
                Masquerading
                1
                Input Capture
                1
                Query Registry
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium21
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                Data Encrypted for Impact
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                31
                Virtualization/Sandbox Evasion
                LSASS Memory211
                Security Software Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth12
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)32
                Process Injection
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Hidden Files and Directories
                NTDS3
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer124
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Rundll32
                Cached Domain Credentials12
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items21
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                File Deletion
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 780216 Sample: file.exe Startdate: 08/01/2023 Architecture: WINDOWS Score: 100 52 Snort IDS alert for network traffic 2->52 54 Multi AV Scanner detection for domain / URL 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 7 other signatures 2->58 8 file.exe 2->8         started        11 wdscede 2->11         started        13 F50.exe 2->13         started        process3 signatures4 68 Detected unpacking (changes PE section rights) 8->68 70 Maps a DLL or memory area into another process 8->70 72 Checks if the current machine is a virtual machine (disk enumeration) 8->72 15 explorer.exe 6 8->15 injected 74 Multi AV Scanner detection for dropped file 11->74 76 Machine Learning detection for dropped file 11->76 78 Creates a thread in another existing process (thread injection) 11->78 process5 dnsIp6 38 58.235.189.192, 49696, 49702, 49705 SKB-ASSKBroadbandCoLtdKR Korea Republic of 15->38 40 degroeneuitzender.nl 5.135.247.111, 443, 49701 OVHFR France 15->40 42 7 other IPs or domains 15->42 28 C:\Users\user\AppData\Roaming\wdscede, PE32 15->28 dropped 30 C:\Users\user\AppData\Local\Temp\F50.exe, PE32 15->30 dropped 32 C:\Users\user\AppData\Local\TempE5A.exe, PE32 15->32 dropped 34 C:\Users\user\...\wdscede:Zone.Identifier, ASCII 15->34 dropped 44 System process connects to network (likely due to code injection or exploit) 15->44 46 Benign windows process drops PE files 15->46 48 Deletes itself after installation 15->48 50 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->50 20 EE5A.exe 1 15->20         started        24 F50.exe 15->24         started        file7 signatures8 process9 file10 36 C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp, PE32 20->36 dropped 60 Multi AV Scanner detection for dropped file 20->60 62 Detected unpacking (changes PE section rights) 20->62 64 Detected unpacking (overwrites its own PE header) 20->64 26 rundll32.exe 1 20->26         started        66 Machine Learning detection for dropped file 24->66 signatures11 process12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe46%ReversingLabsWin32.Backdoor.Convagent
                file.exe52%VirustotalBrowse
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\F50.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\EE5A.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\wdscede100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\EE5A.exe48%VirustotalBrowse
                C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp40%ReversingLabsWin32.Trojan.DanaBot
                C:\Users\user\AppData\Roaming\wdscede46%ReversingLabsWin32.Backdoor.Convagent
                SourceDetectionScannerLabelLinkDownload
                12.2.F50.exe.4a6512c.2.unpack100%AviraTR/Patched.Ren.Gen7Download File
                0.2.file.exe.2c00e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                5.2.EE5A.exe.4a70e67.1.unpack100%AviraHEUR/AGEN.1215478Download File
                5.3.EE5A.exe.4b90000.0.unpack100%AviraHEUR/AGEN.1215478Download File
                4.2.wdscede.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                4.3.wdscede.2be0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.2.F50.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                5.2.EE5A.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
                0.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                12.2.F50.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.3.file.exe.2d30000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                4.2.wdscede.2bd0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                SourceDetectionScannerLabelLink
                vatra.at5%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://degroeneuitzender.nl/systems/index.php0%URL Reputationsafe
                https://degroeneuitzender.nl/systems/index.php0%URL Reputationsafe
                http://194.135.33.42/intel.exe2%VirustotalBrowse
                http://cracker.biz/tmp/0%URL Reputationsafe
                http://skinndia.com/tmp/0%URL Reputationsafe
                http://vatra.at/tmp/0%URL Reputationsafe
                http://194.135.33.42/intel.exe100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                degroeneuitzender.nl
                5.135.247.111
                truetrue
                  unknown
                  vatra.at
                  200.46.66.71
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://degroeneuitzender.nl/systems/index.phpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://194.135.33.42/intel.exetrue
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://cracker.biz/tmp/true
                  • URL Reputation: safe
                  unknown
                  http://skinndia.com/tmp/true
                  • URL Reputation: safe
                  unknown
                  http://vatra.at/tmp/true
                  • URL Reputation: safe
                  unknown
                  http://piratia-life.ru/tmp/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.393736698.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.419303004.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.362501774.0000000008260000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      5.135.247.111
                      degroeneuitzender.nlFrance
                      16276OVHFRtrue
                      187.170.238.164
                      unknownMexico
                      8151UninetSAdeCVMXfalse
                      194.135.33.42
                      unknownRussian Federation
                      49392ASBAXETNRUtrue
                      211.40.39.251
                      unknownKorea Republic of
                      3786LGDACOMLGDACOMCorporationKRfalse
                      109.98.58.98
                      unknownRomania
                      9050RTDBucharestRomaniaROfalse
                      211.119.84.112
                      unknownKorea Republic of
                      3786LGDACOMLGDACOMCorporationKRtrue
                      200.46.66.71
                      vatra.atPanama
                      18809CableOndaPAtrue
                      58.235.189.192
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      IP
                      192.168.2.1
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:780216
                      Start date and time:2023-01-08 16:13:13 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 12m 31s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:2
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.expl.evad.winEXE@9/5@21/9
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 76.1% (good quality ratio 62.3%)
                      • Quality average: 45.2%
                      • Quality standard deviation: 29.3%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240s for rundll32
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, consent.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • TCP Packets have been reduced to 100
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      16:15:19Task SchedulerRun new task: Firefox Default Browser Agent E2E714EC49953D45 path: C:\Users\user\AppData\Roaming\wdscede
                      16:15:45API Interceptor63x Sleep call for process: rundll32.exe modified
                      16:16:10API Interceptor1x Sleep call for process: F50.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):1073152
                      Entropy (8bit):7.800005615070523
                      Encrypted:false
                      SSDEEP:24576:7WRAptQ16TfInIvitS/Y7OGpcvzSOjevqfW21j5AgNtvgwNwtJ:7WGI1SgnK+uneOaczp+L
                      MD5:49D7D06EB3FD5E1DADAA505C021AA571
                      SHA1:45F8B60703019D3605DECEA63C0FDB432194C4B2
                      SHA-256:ED60811AACE1E6EF88644171C8CBC9F1D61C0DE87A389ACF32BBE502F368A12F
                      SHA-512:A8BD3A0C03A832448016E573DF69D82D7D356A02C752F462DA1C3458CE7FDD1E40FF1C3735709BE32167D19226457BB73D13B3D8DC2C757ACF7D52AB7EB095AE
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: Virustotal, Detection: 48%, Browse
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u...............................x`.........1.....................Rich....................PE..L...e..a.................z..........._............@................................./........................................}..P....P..`........................... ................................C..@............................................text...fx.......z.................. ..`.data...4........\...~..............@....rsrc...`....P......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:modified
                      Size (bytes):599040
                      Entropy (8bit):7.538329945935505
                      Encrypted:false
                      SSDEEP:12288:S/VwX5av3q6jIUKhWBburVNHNZVQVw8wlQx+OJ:Sa5av3IUeWgr37VQa8bx3J
                      MD5:47D4D75F4D1D3B2C16D375A671BF0FDC
                      SHA1:2F55C731492FEE2361A4E61E208428ACE550A977
                      SHA-256:F56F46AC0D1D1019F16204341EE0C49F8FF37529EEEA25A4ECA4ED3D60F8B106
                      SHA-512:6A3423D03229EFC187C69121659C193C4B0C2D300844D4E0FF8C488293C78FBBDC4A3F3CFD0C3F238C132EA6979590BFA40266F6977D1028737D52279203E24E
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u...............................x`.........1.....................Rich....................PE..L...P'/b.................z...t~......_............@..................................S.......................................}..P.....~.`........................... ................................C..@............................................text...fx.......z.................. ..`.data....{|...... ...~..............@....rsrc...`.....~.....................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\EE5A.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):731648
                      Entropy (8bit):6.87595719384168
                      Encrypted:false
                      SSDEEP:12288:V8jfuQWjK3lYRk52K/iAkyshv2zjTywBZmAUYiUy+Cz1yVBMjiItbNFNIJOI/rFu:V8DWK3l4kkEPjfywBLTvFFMjiItbNrdr
                      MD5:9DD70D24B2657A9254B9FD536A4D06D5
                      SHA1:348A1D210D7C4DAEF8ECDB692EADF3975971E8EE
                      SHA-256:D0AC0E9021C6E231C60256198309B7F72CE4C5E772CF343B5456C2CE0664B9BD
                      SHA-512:DEE5BFE83FDF196C78EE255E50A25994220CE9ECAC22EB24323DF70E668714D7A810B67DDACE7809D9D7E2160A35C4603DEEDB64B1660D82DDE58586C34D2AB6
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 40%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e:..![.@![.@![.@.,.A&[.@.,.A [.@L..A"[.@![.@5[.@.D.@([.@...A [.@...A [.@...A [.@Rich![.@................PE..L....'.c...........!.........................................................`............@.............................@.......<...............................PF......................................................@............................text............................... ..`.rdata..............................@..@.data....2.......4..................@....reloc..PF.......H..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):6.575872566771664
                      Encrypted:false
                      SSDEEP:3072:dXhYovtL7/BW/LV/0q/R58doOWlbmW25E9WXxpxO5CzELEEhUZNTKXWPr0sd6:ZjL7/B2/0q/wd5kbmWEiWxuCYLiOuN
                      MD5:635E3F021A205AD3A2BF9AAF3D278251
                      SHA1:C4EFD1650FE3BDE0BCBA9AD2772B451B49809EF4
                      SHA-256:FF69D65D2EACB1BD14DB2D94E9DD720AA66A5EF3D108A08D5AFE8A3166305617
                      SHA-512:40C7AECD46FD7E0D2C68046407C7BC285300211165F1B92EC5FB3B187D3A05DD0FB1E91EC2E89D75386D28E28736532BC815D1415C3BA0E6093E56022159F640
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 46%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u...............................x`.........1.....................Rich....................PE..L..../.a.................z...ry......_............@...........................z......H.......................................}..P.....y.`........................... ................................C..@............................................text...fx.......z.................. ..`.data...Txw..........~..............@....rsrc...`.....y.....................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.575872566771664
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:270336
                      MD5:635e3f021a205ad3a2bf9aaf3d278251
                      SHA1:c4efd1650fe3bde0bcba9ad2772b451b49809ef4
                      SHA256:ff69d65d2eacb1bd14db2d94e9dd720aa66a5ef3d108a08d5afe8a3166305617
                      SHA512:40c7aecd46fd7e0d2c68046407c7bc285300211165f1b92ec5fb3b187d3a05dd0fb1e91ec2e89d75386d28e28736532bc815d1415c3ba0e6093e56022159f640
                      SSDEEP:3072:dXhYovtL7/BW/LV/0q/R58doOWlbmW25E9WXxpxO5CzELEEhUZNTKXWPr0sd6:ZjL7/B2/0q/wd5kbmWEiWxuCYLiOuN
                      TLSH:2944AE39358ACC7AC156F4705C35AAE5EFBABC739A20859337943B6F6E702D05222317
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u......................................x`.........1...........................Rich....................PE..L..../.a...........
                      Icon Hash:9062e090c6e73144
                      Entrypoint:0x405fbf
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x61E02F86 [Thu Jan 13 13:56:22 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:b49d1773872141620d6e88f1989600b7
                      Instruction
                      call 00007F8710977318h
                      jmp 00007F871097108Eh
                      mov edi, edi
                      push ebp
                      mov ebp, esp
                      mov eax, dword ptr [ebp+08h]
                      push esi
                      mov esi, ecx
                      mov byte ptr [esi+0Ch], 00000000h
                      test eax, eax
                      jne 00007F8710971275h
                      call 00007F8710976FF5h
                      mov dword ptr [esi+08h], eax
                      mov ecx, dword ptr [eax+6Ch]
                      mov dword ptr [esi], ecx
                      mov ecx, dword ptr [eax+68h]
                      mov dword ptr [esi+04h], ecx
                      mov ecx, dword ptr [esi]
                      cmp ecx, dword ptr [0042A2B8h]
                      je 00007F8710971224h
                      mov ecx, dword ptr [0042A1D4h]
                      test dword ptr [eax+70h], ecx
                      jne 00007F8710971219h
                      call 00007F8710977D2Bh
                      mov dword ptr [esi], eax
                      mov eax, dword ptr [esi+04h]
                      cmp eax, dword ptr [0042A0D8h]
                      je 00007F8710971228h
                      mov eax, dword ptr [esi+08h]
                      mov ecx, dword ptr [0042A1D4h]
                      test dword ptr [eax+70h], ecx
                      jne 00007F871097121Ah
                      call 00007F871097759Fh
                      mov dword ptr [esi+04h], eax
                      mov eax, dword ptr [esi+08h]
                      test byte ptr [eax+70h], 00000002h
                      jne 00007F8710971226h
                      or dword ptr [eax+70h], 02h
                      mov byte ptr [esi+0Ch], 00000001h
                      jmp 00007F871097121Ch
                      mov ecx, dword ptr [eax]
                      mov dword ptr [esi], ecx
                      mov eax, dword ptr [eax+04h]
                      mov dword ptr [esi+04h], eax
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      mov edi, edi
                      push ebp
                      mov ebp, esp
                      sub esp, 10h
                      push esi
                      push dword ptr [ebp+0Ch]
                      lea ecx, dword ptr [ebp-10h]
                      call 00007F871097117Ah
                      mov esi, dword ptr [ebp+08h]
                      movsx eax, byte ptr [esi]
                      push eax
                      call 00007F8710977FD3h
                      cmp eax, 65h
                      jmp 00007F871097121Eh
                      inc esi
                      movzx eax, byte ptr [esi]
                      push eax
                      call 00007F8710977D7Ch
                      test eax, eax
                      pop ecx
                      jne 00007F8710971203h
                      movsx eax, byte ptr [esi]
                      Programming Language:
                      • [ASM] VS2008 build 21022
                      • [ C ] VS2008 build 21022
                      • [IMP] VS2005 build 50727
                      • [C++] VS2008 build 21022
                      • [RES] VS2008 build 21022
                      • [LNK] VS2008 build 21022
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x17dec0x50.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x27910000x18460.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43b80x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x178660x17a00False0.5359519675925926OpenPGP Public Key6.3974793540665855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x190000x27778540x11c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x27910000x184600x18600False0.4747195512820513data5.258086247520373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      AFX_DIALOG_LAYOUT0x27a6b580x2data
                      AFX_DIALOG_LAYOUT0x27a6b500x2data
                      AFX_DIALOG_LAYOUT0x27a6b600x2data
                      AFX_DIALOG_LAYOUT0x27a6b680x2data
                      AFX_DIALOG_LAYOUT0x27a6b700x2data
                      RT_CURSOR0x27a6b780x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
                      RT_CURSOR0x27a6cc00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
                      RT_CURSOR0x27a6df00xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
                      RT_CURSOR0x27a6ee00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                      RT_CURSOR0x27a7fb80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                      RT_ICON0x27919e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishVenezuela
                      RT_ICON0x27920a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishVenezuela
                      RT_ICON0x27926100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishVenezuela
                      RT_ICON0x27936b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishVenezuela
                      RT_ICON0x2793b600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSpanishVenezuela
                      RT_ICON0x2794a080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSpanishVenezuela
                      RT_ICON0x27952b00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSpanishVenezuela
                      RT_ICON0x27959780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSpanishVenezuela
                      RT_ICON0x2795ee00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SpanishVenezuela
                      RT_ICON0x27984880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SpanishVenezuela
                      RT_ICON0x27995300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SpanishVenezuela
                      RT_ICON0x2799eb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SpanishVenezuela
                      RT_ICON0x279a3980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishVenezuela
                      RT_ICON0x279b2400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishVenezuela
                      RT_ICON0x279b9080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishVenezuela
                      RT_ICON0x279be700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishVenezuela
                      RT_ICON0x279e4180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishVenezuela
                      RT_ICON0x279f4c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishVenezuela
                      RT_ICON0x279fe480x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishVenezuela
                      RT_ICON0x27a03180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSpanishVenezuela
                      RT_ICON0x27a11c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSpanishVenezuela
                      RT_ICON0x27a1a680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSpanishVenezuela
                      RT_ICON0x27a21300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSpanishVenezuela
                      RT_ICON0x27a26980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SpanishVenezuela
                      RT_ICON0x27a4c400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SpanishVenezuela
                      RT_ICON0x27a5ce80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SpanishVenezuela
                      RT_ICON0x27a66700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SpanishVenezuela
                      RT_STRING0x27a89c80x38cdataSpanishVenezuela
                      RT_STRING0x27a8d580x53cdataSpanishVenezuela
                      RT_STRING0x27a92980x1c8dataSpanishVenezuela
                      RT_GROUP_CURSOR0x27a6ca80x14data
                      RT_GROUP_CURSOR0x27a88600x14data
                      RT_GROUP_CURSOR0x27a7f880x30data
                      RT_GROUP_ICON0x279a3200x76dataSpanishVenezuela
                      RT_GROUP_ICON0x2793b200x3edataSpanishVenezuela
                      RT_GROUP_ICON0x27a02b00x68dataSpanishVenezuela
                      RT_GROUP_ICON0x27a6ad80x76dataSpanishVenezuela
                      RT_VERSION0x27a88780x150data
                      DLLImport
                      KERNEL32.dllGetModuleHandleA, CreateDirectoryExA, ReadConsoleInputA, GetTempPathW, GetCurrentDirectoryW, RemoveDirectoryW, OutputDebugStringA, GetProcAddress, LocalAlloc, GetBinaryTypeW, SearchPathA, VerifyVersionInfoA, GetProcessPriorityBoost, EndUpdateResourceW, FindNextFileW, FindFirstVolumeW, LocalFree, GlobalFlags, UpdateResourceW, CreateActCtxA, CopyFileW, InterlockedExchangeAdd, GetConsoleAliasW, VerSetConditionMask, CreateMutexA, DeactivateActCtx, GetDiskFreeSpaceA, MoveFileW, GetLogicalDriveStringsA, ResetEvent, MoveFileExW, CreateMailslotA, WriteConsoleInputA, QueryDosDeviceW, InterlockedDecrement, EnumTimeFormatsW, lstrcatW, FindFirstFileA, FreeEnvironmentStringsA, SetErrorMode, GetTickCount, SetLastError, AllocateUserPhysicalPages, GetPrivateProfileStructA, CopyFileExA, MoveFileWithProgressA, LoadLibraryA, GetLastError, DeleteFileA, GetStartupInfoW, HeapAlloc, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, HeapCreate, VirtualFree, HeapFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RaiseException, VirtualAlloc, HeapReAlloc, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, InitializeCriticalSectionAndSpinCount, RtlUnwind, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile, HeapSize, CloseHandle, CreateFileA
                      GDI32.dllGetTextFaceA
                      WINHTTP.dllWinHttpWriteData
                      Language of compilation systemCountry where language is spokenMap
                      SpanishVenezuela
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.4211.119.84.11249697802851815 01/08/23-16:15:21.659638TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184969780192.168.2.4211.119.84.112
                      192.168.2.458.235.189.19249696802851815 01/08/23-16:15:19.707702TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184969680192.168.2.458.235.189.192
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 8, 2023 16:15:17.873878002 CET4969580192.168.2.4200.46.66.71
                      Jan 8, 2023 16:15:18.065856934 CET8049695200.46.66.71192.168.2.4
                      Jan 8, 2023 16:15:18.066106081 CET4969580192.168.2.4200.46.66.71
                      Jan 8, 2023 16:15:18.067889929 CET4969580192.168.2.4200.46.66.71
                      Jan 8, 2023 16:15:18.067934036 CET4969580192.168.2.4200.46.66.71
                      Jan 8, 2023 16:15:18.255868912 CET8049695200.46.66.71192.168.2.4
                      Jan 8, 2023 16:15:18.914453030 CET8049695200.46.66.71192.168.2.4
                      Jan 8, 2023 16:15:18.914858103 CET4969580192.168.2.4200.46.66.71
                      Jan 8, 2023 16:15:18.920737028 CET8049695200.46.66.71192.168.2.4
                      Jan 8, 2023 16:15:18.920962095 CET4969580192.168.2.4200.46.66.71
                      Jan 8, 2023 16:15:19.110353947 CET8049695200.46.66.71192.168.2.4
                      Jan 8, 2023 16:15:19.427349091 CET4969680192.168.2.458.235.189.192
                      Jan 8, 2023 16:15:19.697201014 CET804969658.235.189.192192.168.2.4
                      Jan 8, 2023 16:15:19.698877096 CET4969680192.168.2.458.235.189.192
                      Jan 8, 2023 16:15:19.707701921 CET4969680192.168.2.458.235.189.192
                      Jan 8, 2023 16:15:19.707772970 CET4969680192.168.2.458.235.189.192
                      Jan 8, 2023 16:15:19.977715969 CET804969658.235.189.192192.168.2.4
                      Jan 8, 2023 16:15:20.906863928 CET804969658.235.189.192192.168.2.4
                      Jan 8, 2023 16:15:20.906899929 CET804969658.235.189.192192.168.2.4
                      Jan 8, 2023 16:15:20.907094002 CET4969680192.168.2.458.235.189.192
                      Jan 8, 2023 16:15:20.907228947 CET4969680192.168.2.458.235.189.192
                      Jan 8, 2023 16:15:21.176888943 CET804969658.235.189.192192.168.2.4
                      Jan 8, 2023 16:15:21.408237934 CET4969780192.168.2.4211.119.84.112
                      Jan 8, 2023 16:15:21.659255981 CET8049697211.119.84.112192.168.2.4
                      Jan 8, 2023 16:15:21.659519911 CET4969780192.168.2.4211.119.84.112
                      Jan 8, 2023 16:15:21.659637928 CET4969780192.168.2.4211.119.84.112
                      Jan 8, 2023 16:15:21.659660101 CET4969780192.168.2.4211.119.84.112
                      Jan 8, 2023 16:15:21.910904884 CET8049697211.119.84.112192.168.2.4
                      Jan 8, 2023 16:15:22.608477116 CET8049697211.119.84.112192.168.2.4
                      Jan 8, 2023 16:15:22.608870983 CET4969780192.168.2.4211.119.84.112
                      Jan 8, 2023 16:15:22.609222889 CET8049697211.119.84.112192.168.2.4
                      Jan 8, 2023 16:15:22.609342098 CET4969780192.168.2.4211.119.84.112
                      Jan 8, 2023 16:15:22.639935017 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.667131901 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.667264938 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.667541027 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.694375038 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694494963 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694519997 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694546938 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694570065 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694595098 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694612980 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.694618940 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694644928 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694653988 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.694669962 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694709063 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694721937 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.694736958 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.694740057 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.694819927 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.721873999 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.721910000 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.721929073 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.721950054 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.721968889 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.721990108 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722007990 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722012043 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722034931 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722052097 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722055912 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722078085 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722086906 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722096920 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722116947 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722136021 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722142935 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722156048 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722176075 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722178936 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722196102 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722215891 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722218990 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722235918 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722254992 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722265959 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722273111 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.722295046 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.722326994 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.749603987 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749635935 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749655008 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749674082 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749695063 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749713898 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749733925 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749752045 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749768972 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.749771118 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749794960 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749814987 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749830008 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.749835014 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749856949 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749864101 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.749876976 CET8049698194.135.33.42192.168.2.4
                      Jan 8, 2023 16:15:22.749892950 CET4969880192.168.2.4194.135.33.42
                      Jan 8, 2023 16:15:22.749897957 CET8049698194.135.33.42192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 8, 2023 16:15:17.385386944 CET5657253192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:17.867503881 CET53565728.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:18.947000027 CET5091153192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:19.425726891 CET53509118.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:20.920219898 CET5968353192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:21.406945944 CET53596838.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:28.623908043 CET6416753192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:29.100198984 CET53641678.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:29.408515930 CET5856553192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:29.923669100 CET53585658.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:31.046648026 CET5223953192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:31.080674887 CET53522398.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:33.419670105 CET5680753192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:33.439090014 CET53568078.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:34.674283981 CET6100753192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:34.692118883 CET53610078.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:35.060092926 CET6068653192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:35.079653025 CET53606868.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:36.783070087 CET6112453192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:36.802289963 CET53611248.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:37.988836050 CET5944453192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:38.006567955 CET53594448.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:39.296359062 CET5557053192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:39.313945055 CET53555708.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:40.398849964 CET6490653192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:40.419629097 CET53649068.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:41.532485008 CET5944653192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:41.550576925 CET53594468.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:43.427479982 CET5086153192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:43.445261955 CET53508618.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:45.374746084 CET6108853192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:45.392477036 CET53610888.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:47.346012115 CET5872953192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:47.365782976 CET53587298.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:49.017164946 CET6470053192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:49.034532070 CET53647008.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:50.121398926 CET5602253192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:50.390979052 CET53560228.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:51.343632936 CET6082253192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:51.363027096 CET53608228.8.8.8192.168.2.4
                      Jan 8, 2023 16:15:52.935511112 CET4975053192.168.2.48.8.8.8
                      Jan 8, 2023 16:15:52.959707975 CET53497508.8.8.8192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jan 8, 2023 16:15:17.385386944 CET192.168.2.48.8.8.80x17e4Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:18.947000027 CET192.168.2.48.8.8.80x48b0Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:20.920219898 CET192.168.2.48.8.8.80x2fa7Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:28.623908043 CET192.168.2.48.8.8.80x43ccStandard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.408515930 CET192.168.2.48.8.8.80xe3a6Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:31.046648026 CET192.168.2.48.8.8.80xcb46Standard query (0)degroeneuitzender.nlA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.419670105 CET192.168.2.48.8.8.80x6c34Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.674283981 CET192.168.2.48.8.8.80xb0c3Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.060092926 CET192.168.2.48.8.8.80xe537Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.783070087 CET192.168.2.48.8.8.80x45f8Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:37.988836050 CET192.168.2.48.8.8.80x249cStandard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.296359062 CET192.168.2.48.8.8.80xbb75Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.398849964 CET192.168.2.48.8.8.80x8e50Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.532485008 CET192.168.2.48.8.8.80x4ca6Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.427479982 CET192.168.2.48.8.8.80xa1ceStandard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.374746084 CET192.168.2.48.8.8.80x6065Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.346012115 CET192.168.2.48.8.8.80x68cfStandard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.017164946 CET192.168.2.48.8.8.80x177Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.121398926 CET192.168.2.48.8.8.80xf541Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.343632936 CET192.168.2.48.8.8.80xe6caStandard query (0)vatra.atA (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.935511112 CET192.168.2.48.8.8.80x26d0Standard query (0)vatra.atA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:17.867503881 CET8.8.8.8192.168.2.40x17e4No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:19.425726891 CET8.8.8.8192.168.2.40x48b0No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:21.406945944 CET8.8.8.8192.168.2.40x2fa7No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.100198984 CET8.8.8.8192.168.2.40x43ccNo error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:29.923669100 CET8.8.8.8192.168.2.40xe3a6No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:31.080674887 CET8.8.8.8192.168.2.40xcb46No error (0)degroeneuitzender.nl5.135.247.111A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:33.439090014 CET8.8.8.8192.168.2.40x6c34No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:34.692118883 CET8.8.8.8192.168.2.40xb0c3No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:35.079653025 CET8.8.8.8192.168.2.40xe537No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:36.802289963 CET8.8.8.8192.168.2.40x45f8No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at211.40.39.251A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at211.171.233.129A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at84.224.236.42A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at109.102.255.230A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at151.251.24.5A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at187.232.183.160A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at175.126.109.15A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:38.006567955 CET8.8.8.8192.168.2.40x249cNo error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:39.313945055 CET8.8.8.8192.168.2.40xbb75No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:40.419629097 CET8.8.8.8192.168.2.40x8e50No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:41.550576925 CET8.8.8.8192.168.2.40x4ca6No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:43.445261955 CET8.8.8.8192.168.2.40xa1ceNo error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:45.392477036 CET8.8.8.8192.168.2.40x6065No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at211.40.39.251A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at211.171.233.129A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at84.224.236.42A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at109.102.255.230A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at151.251.24.5A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at187.232.183.160A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at175.126.109.15A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:47.365782976 CET8.8.8.8192.168.2.40x68cfNo error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:49.034532070 CET8.8.8.8192.168.2.40x177No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:50.390979052 CET8.8.8.8192.168.2.40xf541No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:51.363027096 CET8.8.8.8192.168.2.40xe6caNo error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at200.46.66.71A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at109.98.58.98A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at178.31.8.68A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at190.147.188.50A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at175.119.10.231A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at222.236.49.124A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at211.119.84.112A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at58.235.189.192A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at187.170.238.164A (IP address)IN (0x0001)false
                      Jan 8, 2023 16:15:52.959707975 CET8.8.8.8192.168.2.40x26d0No error (0)vatra.at185.95.186.58A (IP address)IN (0x0001)false
                      • degroeneuitzender.nl
                      • nrunfbf.net
                        • vatra.at
                      • utbgbuc.org
                      • laatdiy.org
                      • 194.135.33.42
                      • avjruv.net
                      • fpmhvdgw.com
                      • daffyjk.org
                      • lubvvjyufy.com
                      • tklmgewyg.net
                      • gttbvxrpx.org
                      • qsmspqgdlg.org
                      • wgdttq.org
                      • dotemlc.org
                      • utctbvv.org
                      • tduhcp.org
                      • mwrunlqeb.com
                      • npcojlss.net
                      • yokcj.net
                      • lrmfyx.net
                      • wemmwd.net
                      • ursbcr.net

                      Click to jump to process

                      Target ID:0
                      Start time:16:14:12
                      Start date:08/01/2023
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\file.exe
                      Imagebase:0x400000
                      File size:270336 bytes
                      MD5 hash:635E3F021A205AD3A2BF9AAF3D278251
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.422927170.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.422745433.0000000002D51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000003.327713150.0000000002D30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.422685888.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.422685888.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.422539917.0000000002C00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:1
                      Start time:16:14:25
                      Start date:08/01/2023
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff618f60000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000000.407390160.0000000002A41000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:high

                      Target ID:4
                      Start time:16:15:19
                      Start date:08/01/2023
                      Path:C:\Users\user\AppData\Roaming\wdscede
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\wdscede
                      Imagebase:0x400000
                      File size:270336 bytes
                      MD5 hash:635E3F021A205AD3A2BF9AAF3D278251
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.587334500.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.587334500.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000003.570683568.0000000002BE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.586404126.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.586404126.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.586888838.0000000002C38000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.586363495.0000000002BD0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 46%, ReversingLabs
                      Reputation:low

                      Target ID:5
                      Start time:16:15:23
                      Start date:08/01/2023
                      Path:C:\Users\user\AppData\Local\Temp\EE5A.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Local\Temp\EE5A.exe
                      Imagebase:0x400000
                      File size:1073152 bytes
                      MD5 hash:49D7D06EB3FD5E1DADAA505C021AA571
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.521464355.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.520261780.0000000004997000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 48%, Virustotal, Browse
                      Reputation:low

                      Target ID:6
                      Start time:16:15:31
                      Start date:08/01/2023
                      Path:C:\Users\user\AppData\Local\Temp\F50.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Local\Temp\F50.exe
                      Imagebase:0x400000
                      File size:599040 bytes
                      MD5 hash:47D4D75F4D1D3B2C16D375A671BF0FDC
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.536404249.0000000004830000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.528207435.0000000000413000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.534093898.0000000002EA9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low

                      Target ID:7
                      Start time:16:15:40
                      Start date:08/01/2023
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
                      Imagebase:0x250000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:12
                      Start time:16:15:51
                      Start date:08/01/2023
                      Path:C:\Users\user\AppData\Local\Temp\F50.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\F50.exe"
                      Imagebase:0x400000
                      File size:599040 bytes
                      MD5 hash:47D4D75F4D1D3B2C16D375A671BF0FDC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.567433680.0000000000413000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000C.00000002.568515234.0000000002E8E000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000C.00000002.568347439.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      No disassembly