Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qCc1a4w5YZ.exe

Overview

General Information

Sample name:qCc1a4w5YZ.exe
(renamed file extension from rl to exe, renamed because original name is a hash value)
Original sample name:42ae1eabe02cf20ce21b32dc0f0f3a90206887a6.rl
Analysis ID:1411680
MD5:fb1c4d59adaf64a044dba323ea8fe6f0
SHA1:42ae1eabe02cf20ce21b32dc0f0f3a90206887a6
SHA256:8052e7b4b67c2cafa041fdc3b7daa5684d1a85ad9b1b5ca1b7beba8631bac062
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • qCc1a4w5YZ.exe (PID: 2680 cmdline: "C:\Users\user\Desktop\qCc1a4w5YZ.exe" MD5: FB1C4D59ADAF64A044DBA323EA8FE6F0)
    • tasksche.exe (PID: 3256 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 7F7CCAA16FB15EB1C7399D422F8363E8)
  • qCc1a4w5YZ.exe (PID: 3164 cmdline: C:\Users\user\Desktop\qCc1a4w5YZ.exe -m security MD5: FB1C4D59ADAF64A044DBA323EA8FE6F0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
qCc1a4w5YZ.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    qCc1a4w5YZ.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x3136c:$x3: tasksche.exe
    • 0x4157c:$x3: tasksche.exe
    • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x415d0:$x5: WNcry@2ol7
    • 0x313d7:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0xe048:$x7: mssecsvc.exe
    • 0x17350:$x7: mssecsvc.exe
    • 0x31344:$x8: C:\%s\qeriuwjhrf
    • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0xe034:$s1: C:\%s\%s
    • 0x17338:$s1: C:\%s\%s
    • 0x31358:$s1: C:\%s\%s
    • 0x414d0:$s3: cmd.exe /c "%s"
    • 0x73a24:$s4: msg/m_portuguese.wnry
    • 0x2e68c:$s5: \\192.168.56.20\IPC$
    • 0x1ba81:$s6: \\172.16.99.5\IPC$
    • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
    qCc1a4w5YZ.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
    • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
    • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
    • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
    • 0x1d439:$s1: __TREEID__PLACEHOLDER__
    • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
    • 0x1f508:$s1: __TREEID__PLACEHOLDER__
    • 0x20570:$s1: __TREEID__PLACEHOLDER__
    • 0x215d8:$s1: __TREEID__PLACEHOLDER__
    • 0x22640:$s1: __TREEID__PLACEHOLDER__
    • 0x236a8:$s1: __TREEID__PLACEHOLDER__
    • 0x24710:$s1: __TREEID__PLACEHOLDER__
    • 0x25778:$s1: __TREEID__PLACEHOLDER__
    • 0x267e0:$s1: __TREEID__PLACEHOLDER__
    • 0x27848:$s1: __TREEID__PLACEHOLDER__
    • 0x288b0:$s1: __TREEID__PLACEHOLDER__
    • 0x29918:$s1: __TREEID__PLACEHOLDER__
    • 0x2a980:$s1: __TREEID__PLACEHOLDER__
    • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
    • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
    • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
    • 0x2e340:$s1: __TREEID__PLACEHOLDER__
    qCc1a4w5YZ.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    qCc1a4w5YZ.exeWin32_Ransomware_WannaCryunknownReversingLabs
    • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
    • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
    • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
    • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000004.00000000.338908311.000000000040F000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000005.00000000.340346288.000000000040E000.00000008.00000001.01000000.00000005.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            4.2.qCc1a4w5YZ.exe.27fc8c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            4.2.qCc1a4w5YZ.exe.22e4084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            4.2.qCc1a4w5YZ.exe.7100a4.1.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              4.2.qCc1a4w5YZ.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              4.2.qCc1a4w5YZ.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 101 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\qCc1a4w5YZ.exe, ProcessId: 2680, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
              Timestamp:03/19/24-12:59:26.731566
              SID:2024298
              Source Port:49161
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:03/19/24-12:59:27.283141
              SID:2031515
              Source Port:80
              Destination Port:49162
              Protocol:TCP
              Classtype:Misc activity
              Timestamp:03/19/24-12:59:26.506948
              SID:2024291
              Source Port:54562
              Destination Port:53
              Protocol:UDP
              Classtype:A Network Trojan was detected
              Timestamp:03/19/24-12:59:27.165393
              SID:2024298
              Source Port:49162
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:03/19/24-12:59:26.837633
              SID:2031515
              Source Port:80
              Destination Port:49161
              Protocol:TCP
              Classtype:Misc activity
              Timestamp:03/19/24-12:59:26.963276
              SID:2024291
              Source Port:52917
              Destination Port:53
              Protocol:UDP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: qCc1a4w5YZ.exeAvira: detected
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comAvira URL Cloud: Label: malware
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Avira URL Cloud: Label: malware
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
              Source: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comVirustotal: Detection: 7%Perma Link
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comVirustotal: Detection: 7%Perma Link
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Virustotal: Detection: 7%Perma Link
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
              Source: C:\Windows\tasksche.exeVirustotal: Detection: 92%Perma Link
              Source: qCc1a4w5YZ.exeReversingLabs: Detection: 100%
              Source: qCc1a4w5YZ.exeVirustotal: Detection: 93%Perma Link
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: qCc1a4w5YZ.exeJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 5_2_004018B9 CryptReleaseContext,5_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.115:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.116:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.119:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.117:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.118:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.115:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.116:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.119:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.117:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.118:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: qCc1a4w5YZ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

              Networking

              barindex
              Source: TrafficSnort IDS: 2024291 ET TROJAN Possible WannaCry DNS Lookup 1 192.168.2.22:54562 -> 8.8.8.8:53
              Source: TrafficSnort IDS: 2024298 ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 192.168.2.22:49161 -> 104.17.244.81:80
              Source: TrafficSnort IDS: 2031515 ET TROJAN Known Sinkhole Response Kryptos Logic 104.17.244.81:80 -> 192.168.2.22:49161
              Source: TrafficSnort IDS: 2024291 ET TROJAN Possible WannaCry DNS Lookup 1 192.168.2.22:52917 -> 8.8.8.8:53
              Source: TrafficSnort IDS: 2024298 ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 192.168.2.22:49162 -> 104.17.244.81:80
              Source: TrafficSnort IDS: 2031515 ET TROJAN Known Sinkhole Response Kryptos Logic 104.17.244.81:80 -> 192.168.2.22:49162
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 19 Mar 2024 11:59:26 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 866d4be05d6b5e86-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 19 Mar 2024 11:59:27 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 866d4be30cbc0f83-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: unknownNetwork traffic detected: IP country count 20
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 214.137.245.2
              Source: unknownTCP traffic detected without corresponding DNS query: 203.79.193.247
              Source: unknownTCP traffic detected without corresponding DNS query: 120.15.162.62
              Source: unknownTCP traffic detected without corresponding DNS query: 141.67.174.208
              Source: unknownTCP traffic detected without corresponding DNS query: 143.98.163.93
              Source: unknownTCP traffic detected without corresponding DNS query: 211.233.9.32
              Source: unknownTCP traffic detected without corresponding DNS query: 200.171.37.34
              Source: unknownTCP traffic detected without corresponding DNS query: 82.147.32.72
              Source: unknownTCP traffic detected without corresponding DNS query: 59.78.128.44
              Source: unknownTCP traffic detected without corresponding DNS query: 184.90.137.138
              Source: unknownTCP traffic detected without corresponding DNS query: 49.149.212.33
              Source: unknownTCP traffic detected without corresponding DNS query: 157.87.74.109
              Source: unknownTCP traffic detected without corresponding DNS query: 134.46.137.214
              Source: unknownTCP traffic detected without corresponding DNS query: 92.85.153.197
              Source: unknownTCP traffic detected without corresponding DNS query: 223.117.141.206
              Source: unknownTCP traffic detected without corresponding DNS query: 205.170.59.230
              Source: unknownTCP traffic detected without corresponding DNS query: 167.202.20.98
              Source: unknownTCP traffic detected without corresponding DNS query: 215.232.13.19
              Source: unknownTCP traffic detected without corresponding DNS query: 106.225.177.219
              Source: unknownTCP traffic detected without corresponding DNS query: 120.31.152.218
              Source: unknownTCP traffic detected without corresponding DNS query: 102.6.66.108
              Source: unknownTCP traffic detected without corresponding DNS query: 74.72.249.143
              Source: unknownTCP traffic detected without corresponding DNS query: 24.108.26.189
              Source: unknownTCP traffic detected without corresponding DNS query: 77.103.225.161
              Source: unknownTCP traffic detected without corresponding DNS query: 61.131.243.6
              Source: unknownTCP traffic detected without corresponding DNS query: 223.223.204.191
              Source: unknownTCP traffic detected without corresponding DNS query: 66.58.6.205
              Source: unknownTCP traffic detected without corresponding DNS query: 148.235.105.203
              Source: unknownTCP traffic detected without corresponding DNS query: 63.253.202.201
              Source: unknownTCP traffic detected without corresponding DNS query: 152.160.70.29
              Source: unknownTCP traffic detected without corresponding DNS query: 161.132.93.183
              Source: unknownTCP traffic detected without corresponding DNS query: 138.106.27.189
              Source: unknownTCP traffic detected without corresponding DNS query: 136.62.32.195
              Source: unknownTCP traffic detected without corresponding DNS query: 174.237.224.230
              Source: unknownTCP traffic detected without corresponding DNS query: 97.103.153.59
              Source: unknownTCP traffic detected without corresponding DNS query: 196.152.41.222
              Source: unknownTCP traffic detected without corresponding DNS query: 136.81.3.67
              Source: unknownTCP traffic detected without corresponding DNS query: 114.71.66.208
              Source: unknownTCP traffic detected without corresponding DNS query: 162.53.105.46
              Source: unknownTCP traffic detected without corresponding DNS query: 176.74.29.67
              Source: unknownTCP traffic detected without corresponding DNS query: 119.35.93.148
              Source: unknownTCP traffic detected without corresponding DNS query: 204.249.107.70
              Source: unknownTCP traffic detected without corresponding DNS query: 46.174.180.99
              Source: unknownTCP traffic detected without corresponding DNS query: 146.29.152.53
              Source: unknownTCP traffic detected without corresponding DNS query: 222.34.195.17
              Source: unknownTCP traffic detected without corresponding DNS query: 137.157.60.35
              Source: unknownTCP traffic detected without corresponding DNS query: 135.39.29.27
              Source: unknownTCP traffic detected without corresponding DNS query: 198.104.2.29
              Source: unknownTCP traffic detected without corresponding DNS query: 75.16.253.158
              Source: unknownTCP traffic detected without corresponding DNS query: 24.120.0.173
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.datJump to behavior
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: unknownDNS traffic detected: queries for: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: qCc1a4w5YZ.exeString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: qCc1a4w5YZ.exe, 00000000.00000002.342021975.0000000000BE4000.00000004.00000020.00020000.00000000.sdmp, qCc1a4w5YZ.exe, 00000004.00000002.476028521.00000000002D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: qCc1a4w5YZ.exe, 00000004.00000002.476019020.000000000018C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!5_2_004014A6
              Source: Yara matchFile source: qCc1a4w5YZ.exe, type: SAMPLE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.282e96c.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.280b948.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.27fc8c8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.2316128.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.2316128.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.22ef0a4.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.282e96c.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.280b948.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.22f3104.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.22f3104.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.qCc1a4w5YZ.exe.28078e8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.338908311.000000000040F000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.335185624.000000000040F000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.338930451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.476299865.000000000280B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.476242619.00000000022F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.335206533.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qCc1a4w5YZ.exe PID: 2680, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: qCc1a4w5YZ.exe PID: 3164, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.27fc8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.27fc8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.27fc8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.22ef0a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.22ef0a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.qCc1a4w5YZ.exe.28078e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.qCc1a4w5YZ.exe.28078e8.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.340346288.000000000040E000.00000008.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000004.00000000.338930451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000004.00000002.476299865.000000000280B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000004.00000002.476242619.00000000022F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000000.00000000.335206533.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.datJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 5_2_00406C405_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 5_2_00402A765_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 5_2_00402E7E5_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 5_2_0040350F5_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 5_2_00404C195_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 5_2_0040541F5_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 5_2_004037975_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 5_2_004043B75_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 5_2_004031BC5_2_004031BC
              Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
              Source: qCc1a4w5YZ.exeStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: tasksche.exe.0.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeSection loaded: rasadhlp.dllJump to behavior
              Source: qCc1a4w5YZ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: qCc1a4w5YZ.exe, type: SAMPLEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.27fc8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.27fc8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.27fc8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.22e4084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.2316128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.22ef0a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.22ef0a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.282e96c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.280b948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.2.qCc1a4w5YZ.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.0.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.0.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.2.qCc1a4w5YZ.exe.22f3104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.qCc1a4w5YZ.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.qCc1a4w5YZ.exe.28078e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.qCc1a4w5YZ.exe.28078e8.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.340346288.000000000040E000.00000008.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000004.00000000.338930451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000004.00000002.476299865.000000000280B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000004.00000002.476242619.00000000022F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000000.00000000.335206533.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000005.00000000.340346288.000000000040E000.00000008.00000001.01000000.00000005.sdmp, qCc1a4w5YZ.exe, tasksche.exe.0.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winEXE@4/1@2/100
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,0_2_00407C40
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,4_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00401CE8
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeCode function: 0_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,0_2_00407CE0
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeCode function: 0_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,0_2_00407C40
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeCode function: 0_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,0_2_00408090
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeCode function: 4_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,4_2_00408090
              Source: qCc1a4w5YZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: qCc1a4w5YZ.exeReversingLabs: Detection: 100%
              Source: qCc1a4w5YZ.exeVirustotal: Detection: 93%
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile read: C:\Users\user\Desktop\qCc1a4w5YZ.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\qCc1a4w5YZ.exe "C:\Users\user\Desktop\qCc1a4w5YZ.exe"
              Source: unknownProcess created: C:\Users\user\Desktop\qCc1a4w5YZ.exe C:\Users\user\Desktop\qCc1a4w5YZ.exe -m security
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\InProcServer32Jump to behavior
              Source: qCc1a4w5YZ.exeStatic file information: File size 3723264 > 1048576
              Source: qCc1a4w5YZ.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x35b000
              Source: C:\Windows\tasksche.exeCode function: 5_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 5_2_00407710 push eax; ret 5_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 5_2_004076C8 push eax; ret 5_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeCode function: 0_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,0_2_00407C40
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 2656Thread sleep time: -180000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 3208Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 3224Thread sleep count: 54 > 30Jump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 3224Thread sleep time: -108000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 3228Thread sleep count: 54 > 30Jump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 3232Thread sleep count: 122 > 30Jump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 3228Thread sleep count: 45 > 30Jump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exe TID: 3224Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\tasksche.exeCode function: 5_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 5_2_004029CC free,GetProcessHeap,HeapFree,5_2_004029CC
              Source: C:\Users\user\Desktop\qCc1a4w5YZ.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              2
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory11
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media12
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              Remote System Discovery
              Distributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              qCc1a4w5YZ.exe100%ReversingLabsWin32.Ransomware.WannaCry
              qCc1a4w5YZ.exe93%VirustotalBrowse
              qCc1a4w5YZ.exe100%AviraTR/AD.WannaCry.bqdjz
              qCc1a4w5YZ.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/AD.WannaCry.sewvt
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\Windows\tasksche.exe97%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe93%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com8%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com100%Avira URL Cloudmalware
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/100%Avira URL Cloudmalware
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com8%VirustotalBrowse
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.17.244.81
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/true
              • 8%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comqCc1a4w5YZ.exefalse
              • 8%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJqCc1a4w5YZ.exe, 00000004.00000002.476019020.000000000018C000.00000004.00000010.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              95.157.0.161
              unknownGermany
              35244KMS-DE_ASDEfalse
              71.169.117.113
              unknownUnited States
              701UUNETUSfalse
              43.23.69.97
              unknownJapan4249LILLY-ASUSfalse
              177.202.247.211
              unknownBrazil
              8167BrasilTelecomSA-FilialDistritoFederalBRfalse
              77.191.157.219
              unknownGermany
              6805TDDE-ASN1DEfalse
              40.11.59.238
              unknownUnited States
              4249LILLY-ASUSfalse
              5.209.64.109
              unknownIran (ISLAMIC Republic Of)
              197207MCCI-ASIRfalse
              98.134.15.119
              unknownUnited States
              8473BAHNHOFhttpwwwbahnhofnetSEfalse
              155.205.80.136
              unknownAustralia
              132321NTG-ICT-AUNorthernTerritoryGovernmentAUfalse
              151.166.91.109
              unknownUnited States
              385AFCONC-BLOCK1-ASUSfalse
              208.211.82.17
              unknownUnited States
              701UUNETUSfalse
              122.31.109.40
              unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
              158.149.160.8
              unknownNorway
              29492EIDSIVA-ASNNOfalse
              71.12.218.12
              unknownUnited States
              20115CHARTER-20115USfalse
              193.186.231.243
              unknownAustria
              21039E-STEIERMARK-ASNATfalse
              84.89.111.38
              unknownSpain
              13041CESCA-ACESfalse
              205.202.243.57
              unknownUnited States
              11714NETWORKNEBRASKAUSfalse
              139.110.30.40
              unknownNorway
              5619EVRY-NOfalse
              63.1.216.84
              unknownUnited States
              701UUNETUSfalse
              195.30.246.218
              unknownGermany
              5539SPACENETSpaceNETAGDEfalse
              216.19.53.67
              unknownUnited States
              64242SPEEDCONNECTUSfalse
              140.36.107.72
              unknownUnited States
              668DNIC-AS-00668USfalse
              22.212.166.190
              unknownUnited States
              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              147.14.242.12
              unknownSweden
              41076POSTDK-ASDKfalse
              135.82.150.58
              unknownUnited States
              18676AVAYAUSfalse
              59.106.164.161
              unknownJapan9370SAKURA-BSAKURAInternetIncJPfalse
              154.49.193.47
              unknownUnited States
              174COGENT-174USfalse
              19.124.227.36
              unknownUnited States
              3MIT-GATEWAYSUSfalse
              81.196.137.227
              unknownRomania
              8708RCS-RDS73-75DrStaicoviciROfalse
              92.85.153.197
              unknownRomania
              9050RTDBucharestRomaniaROfalse
              97.103.153.59
              unknownUnited States
              33363BHN-33363USfalse
              184.159.80.182
              unknownUnited States
              209CENTURYLINK-US-LEGACY-QWESTUSfalse
              151.28.169.3
              unknownItaly
              1267ASN-WINDTREIUNETEUfalse
              180.217.111.193
              unknownTaiwan; Republic of China (ROC)
              24157VIBO-NET-ASTaiwanStarTelecomCorporationLimitedFormerfalse
              185.161.75.21
              unknownHungary
              206892RENDSZERINFHUfalse
              139.30.212.105
              unknownGermany
              680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
              185.111.218.21
              unknownRussian Federation
              61400NETRACK-ASRUfalse
              196.83.52.9
              unknownMorocco
              6713IAM-ASMAfalse
              135.25.143.106
              unknownUnited States
              54614CIKTELECOM-CABLECAfalse
              18.155.205.32
              unknownUnited States
              16509AMAZON-02USfalse
              46.16.225.155
              unknownRussian Federation
              44391ESD-ASRUfalse
              34.58.7.138
              unknownUnited States
              2686ATGS-MMD-ASUSfalse
              93.179.86.193
              unknownRussian Federation
              59793CISP-ASRUfalse
              63.26.237.88
              unknownUnited States
              6984NYNEX-ASUSfalse
              163.195.106.64
              unknownSouth Africa
              37130SITA-ASZAfalse
              191.229.51.95
              unknownBrazil
              26615TIMSABRfalse
              135.123.39.190
              unknownUnited States
              18676AVAYAUSfalse
              55.52.236.112
              unknownUnited States
              358DNIC-ASBLK-00306-00371USfalse
              222.34.195.17
              unknownChina
              134810CMNET-JILIN-AS-APChinaMobileGroupJiLincommunicationscofalse
              104.152.90.81
              unknownUnited States
              11527TCS-SOLUSfalse
              192.247.56.231
              unknownUnited States
              394386OCANCAfalse
              104.17.244.81
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comUnited States
              13335CLOUDFLARENETUStrue
              158.226.220.137
              unknownSwitzerland
              9159CreditAgricoleFRfalse
              199.125.6.193
              unknownUnited States
              721DNIC-ASBLK-00721-00726USfalse
              54.89.240.53
              unknownUnited States
              14618AMAZON-AESUSfalse
              128.88.221.129
              unknownUnited States
              7430TANDEMUSfalse
              104.112.116.50
              unknownUnited States
              28573CLAROSABRfalse
              214.159.201.75
              unknownUnited States
              721DNIC-ASBLK-00721-00726USfalse
              141.43.125.82
              unknownGermany
              680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
              IP
              192.168.2.148
              192.168.2.149
              192.168.2.146
              192.168.2.147
              192.168.2.140
              192.168.2.141
              192.168.2.144
              192.168.2.145
              192.168.2.142
              192.168.2.143
              192.168.2.159
              192.168.2.157
              192.168.2.158
              192.168.2.151
              192.168.2.152
              192.168.2.150
              192.168.2.155
              192.168.2.156
              192.168.2.153
              192.168.2.154
              192.168.2.126
              192.168.2.127
              192.168.2.124
              192.168.2.125
              192.168.2.128
              192.168.2.129
              192.168.2.122
              192.168.2.123
              192.168.2.120
              192.168.2.121
              10.125.245.135
              192.168.2.97
              192.168.2.137
              192.168.2.96
              192.168.2.138
              192.168.2.99
              192.168.2.135
              192.168.2.98
              192.168.2.136
              192.168.2.139
              192.168.2.130
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1411680
              Start date and time:2024-03-19 12:58:40 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 57s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:qCc1a4w5YZ.exe
              (renamed file extension from rl to exe, renamed because original name is a hash value)
              Original Sample Name:42ae1eabe02cf20ce21b32dc0f0f3a90206887a6.rl
              Detection:MAL
              Classification:mal100.rans.expl.evad.winEXE@4/1@2/100
              EGA Information:
              • Successful, ratio: 66.7%
              HCA Information:Failed
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
              • Execution Graph export aborted for target tasksche.exe, PID 3256 because there are no executed function
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              12:59:24API Interceptor2388x Sleep call for process: qCc1a4w5YZ.exe modified
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comhttp://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
              • 104.17.244.81
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
              • 104.16.173.80
              02353699.exeGet hashmaliciousWannacryBrowse
              • 104.16.173.80
              05894899.exeGet hashmaliciousWannacryBrowse
              • 104.17.244.81
              dNDbcC4Trx.exeGet hashmaliciousWannacryBrowse
              • 104.17.244.81
              tk6uE0LqBo.exeGet hashmaliciousWannacryBrowse
              • 104.17.244.81
              lioUeojCW0.exeGet hashmaliciousWannacryBrowse
              • 104.17.244.81
              hCg5azGZ3S.exeGet hashmaliciousWannacryBrowse
              • 104.17.244.81
              iWxJnG4tgQ.exeGet hashmaliciousWannacryBrowse
              • 104.17.244.81
              5KG3HopzFf.exeGet hashmaliciousWannacryBrowse
              • 104.17.244.81
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              KMS-DE_ASDEskid.x86.elfGet hashmaliciousMirai, MoobotBrowse
              • 95.157.43.31
              t952M4QOm8.elfGet hashmaliciousMiraiBrowse
              • 95.157.1.168
              zOKUvUgL0n.elfGet hashmaliciousMiraiBrowse
              • 46.128.51.235
              r3fLoZrV7T.elfGet hashmaliciousMiraiBrowse
              • 77.47.23.65
              HROFrIvvVk.elfGet hashmaliciousMiraiBrowse
              • 46.128.51.218
              nnOhQG5PkE.elfGet hashmaliciousMiraiBrowse
              • 77.47.59.210
              flB6ygLzMc.elfGet hashmaliciousMiraiBrowse
              • 77.47.23.43
              dq0s72MFq3.elfGet hashmaliciousMiraiBrowse
              • 77.47.23.63
              CTRohfxuuX.elfGet hashmaliciousUnknownBrowse
              • 88.215.87.221
              sora.arm.elfGet hashmaliciousMiraiBrowse
              • 88.215.87.245
              UUNETUShttps://u43046827.ct.sendgrid.net/ls/click?upn=u001.9VHLeMPT-2FpgU5o8m-2F14MwvUfe0bWbtnJUI8Zq0olKrWHB65SHPLEcoF8PygluFz3tM9xm-2BgSb-2FXs1hN955wBZg-3D-3DWQ1a_HugXHfUURLjio0NDJvkCDhedd6ryxBamWBqA3Uoq0PhwHvltbg0s-2F-2F3Syr-2B5YzCc9T1AL3nYX5XHvHAzVR7pEkVw-2FefYjfGAgXEHr-2Bxv8UN9-2B2uA7NfLReF-2FKHmdycojNEeIKFwihOeDc0oJ0-2Bond-2FRWOKrbFXDRmg4PoOeUaAOnlW0L18SBVAQx2xHhUr1yYvYxeh2DzHe1C-2BJui7zdrXDogBFLSn-2FGSyCqdJTxVpc-3DGet hashmaliciousHTMLPhisherBrowse
              • 146.190.129.51
              https://ijdusqwrohoiom.s3.ap-east-1.amazonaws.com/ijdusqwrohoiom.html#4KtZGW6879WyRf493mmiwohcsia1681GHZPKFDOZAMLFUH86446/733104j21#q0kvx6a1ntygndsvgojbwxcovs3k7p88g8y2izqgugrlx484ajg8j1cGet hashmaliciousPhisherBrowse
              • 146.190.102.210
              https://vghpsimdplmwc.s3.amazonaws.com/vghpsimdplmwc.html#4FRnVP6868zmfR493tnmwllyusk1585HHMTITXPKQQDUGQ18091/733104C21#c1p42w46m4kwzliliqghbluf3ezx6gf7ur7w1piqq0gw35fwp51s1ixGet hashmaliciousPhisherBrowse
              • 146.190.102.210
              TF2AD5Jnbu.elfGet hashmaliciousUnknownBrowse
              • 71.122.129.193
              yzIY5KFJSu.elfGet hashmaliciousMiraiBrowse
              • 108.41.160.15
              5dm0sjynSD.elfGet hashmaliciousUnknownBrowse
              • 63.23.174.162
              o7EitOEfWr.elfGet hashmaliciousUnknownBrowse
              • 65.198.205.241
              8B5NOWiWn8.elfGet hashmaliciousUnknownBrowse
              • 152.211.115.44
              bzVCvtoyIt.elfGet hashmaliciousMiraiBrowse
              • 149.230.227.62
              hyWl33Q2OI.elfGet hashmaliciousUnknownBrowse
              • 65.204.237.138
              LILLY-ASUSSecuriteInfo.com.Trojan.PWS.Siggen2.60328.11377.32540.exeGet hashmaliciousUnknownBrowse
              • 43.152.136.177
              8B5NOWiWn8.elfGet hashmaliciousUnknownBrowse
              • 40.244.34.105
              bzVCvtoyIt.elfGet hashmaliciousMiraiBrowse
              • 43.59.23.153
              hyWl33Q2OI.elfGet hashmaliciousUnknownBrowse
              • 43.56.38.242
              7p4wRYn0OK.elfGet hashmaliciousMiraiBrowse
              • 40.239.119.41
              usCv5xTgmC.elfGet hashmaliciousUnknownBrowse
              • 42.132.65.14
              FoDoFx0t5a.elfGet hashmaliciousMiraiBrowse
              • 43.63.117.142
              TduoIaOsBQ.elfGet hashmaliciousUnknownBrowse
              • 42.212.92.214
              xFe4GHvmqU.elfGet hashmaliciousUnknownBrowse
              • 43.127.208.187
              QEMy2mlwhJ.elfGet hashmaliciousMiraiBrowse
              • 43.73.22.157
              BrasilTelecomSA-FilialDistritoFederalBRyzIY5KFJSu.elfGet hashmaliciousMiraiBrowse
              • 179.253.102.23
              8B5NOWiWn8.elfGet hashmaliciousUnknownBrowse
              • 200.219.112.88
              bzVCvtoyIt.elfGet hashmaliciousMiraiBrowse
              • 177.3.42.41
              7InjeWQVHC.elfGet hashmaliciousUnknownBrowse
              • 201.89.39.9
              uA97EyP1li.elfGet hashmaliciousMiraiBrowse
              • 201.35.197.2
              wbHziCLDIg.elfGet hashmaliciousMiraiBrowse
              • 191.221.202.40
              ry3HbSIIPt.elfGet hashmaliciousMiraiBrowse
              • 200.103.157.246
              PPIQY37OuD.elfGet hashmaliciousUnknownBrowse
              • 179.255.153.159
              Jx14GO9SfG.elfGet hashmaliciousMiraiBrowse
              • 191.219.7.147
              1WqX6biryS.elfGet hashmaliciousMiraiBrowse
              • 201.67.164.120
              TDDE-ASN1DEyzIY5KFJSu.elfGet hashmaliciousMiraiBrowse
              • 2.211.128.245
              bzVCvtoyIt.elfGet hashmaliciousMiraiBrowse
              • 217.50.136.240
              PD1Afd15RS.elfGet hashmaliciousMiraiBrowse
              • 2.241.171.103
              QGN4hQprkC.elfGet hashmaliciousMiraiBrowse
              • 89.12.132.165
              RpjE7NostK.elfGet hashmaliciousMiraiBrowse
              • 77.190.53.65
              wbHziCLDIg.elfGet hashmaliciousMiraiBrowse
              • 92.230.179.166
              K3k8Tqy0DP.elfGet hashmaliciousMiraiBrowse
              • 2.246.191.60
              PPIQY37OuD.elfGet hashmaliciousUnknownBrowse
              • 92.231.75.12
              1PfkUPbqjw.elfGet hashmaliciousMiraiBrowse
              • 85.183.38.244
              ThOZWVZFbg.elfGet hashmaliciousMiraiBrowse
              • 77.179.204.62
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Windows\tasksche.exestN592INV6.exeGet hashmaliciousWannacryBrowse
                onq54JS79W.exeGet hashmaliciousWannacryBrowse
                  mbXvGlj2dR.dllGet hashmaliciousWannacryBrowse
                    MSNRf9dZ63.exeGet hashmaliciousWannacryBrowse
                      7Qu8thR7WW.dllGet hashmaliciousWannacry, VirutBrowse
                        MSmReFKunQ.dllGet hashmaliciousWannacryBrowse
                          kXpnLUmuU2.dllGet hashmaliciousWannacryBrowse
                            TigrxMihsc.dllGet hashmaliciousWannacryBrowse
                              iTQzi9bir4.dllGet hashmaliciousWannacryBrowse
                                5nuyzrvshp.dllGet hashmaliciousVirut, WannacryBrowse
                                  Process:C:\Users\user\Desktop\qCc1a4w5YZ.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3514368
                                  Entropy (8bit):7.996072890929898
                                  Encrypted:true
                                  SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                  MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                  SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                  SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                  SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 97%
                                  • Antivirus: Virustotal, Detection: 93%, Browse
                                  Joe Sandbox View:
                                  • Filename: stN592INV6.exe, Detection: malicious, Browse
                                  • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                  • Filename: mbXvGlj2dR.dll, Detection: malicious, Browse
                                  • Filename: MSNRf9dZ63.exe, Detection: malicious, Browse
                                  • Filename: 7Qu8thR7WW.dll, Detection: malicious, Browse
                                  • Filename: MSmReFKunQ.dll, Detection: malicious, Browse
                                  • Filename: kXpnLUmuU2.dll, Detection: malicious, Browse
                                  • Filename: TigrxMihsc.dll, Detection: malicious, Browse
                                  • Filename: iTQzi9bir4.dll, Detection: malicious, Browse
                                  • Filename: 5nuyzrvshp.dll, Detection: malicious, Browse
                                  Reputation:moderate, very likely benign file
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.965905229015079
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:qCc1a4w5YZ.exe
                                  File size:3'723'264 bytes
                                  MD5:fb1c4d59adaf64a044dba323ea8fe6f0
                                  SHA1:42ae1eabe02cf20ce21b32dc0f0f3a90206887a6
                                  SHA256:8052e7b4b67c2cafa041fdc3b7daa5684d1a85ad9b1b5ca1b7beba8631bac062
                                  SHA512:1d76ee4218592249536a09ee1b76b91939905e32d0ad0a53c7b92fb11b3d02e642a1c9ed484bffc123cf7f2501f1d780d1b2b7bb2a2404120efaa27c6c325f35
                                  SSDEEP:98304:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2HI:yDqPe1Cxcxk3ZAEUadzR8yc4HI
                                  TLSH:34063394612CB2FCF0440EB44473896AB7B33C69A7BA5E1F9BC086670D53B5BAFD0641
                                  File Content Preview:MZ......................@...............................................!..L.!This prolpem cannot be rua in DOS mode....$.......U<S..]=..]=..]=.jA1..]=..A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L..
                                  Icon Hash:aaf3e3e3918382a0
                                  Entrypoint:0x409a16
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  DLL Characteristics:
                                  Time Stamp:0x4CE78ECC [Sat Nov 20 09:03:08 2010 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:9ecee117164e0b870a53dd187cdd7174
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push FFFFFFFFh
                                  push 0040A1A0h
                                  push 00409BA2h
                                  mov eax, dword ptr fs:[00000000h]
                                  push eax
                                  mov dword ptr fs:[00000000h], esp
                                  sub esp, 68h
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [ebp-18h], esp
                                  xor ebx, ebx
                                  mov dword ptr [ebp-04h], ebx
                                  push 00000002h
                                  call dword ptr [0040A0C0h]
                                  pop ecx
                                  or dword ptr [0070F894h], FFFFFFFFh
                                  or dword ptr [0070F898h], FFFFFFFFh
                                  call dword ptr [0040A0C8h]
                                  mov ecx, dword ptr [0070F88Ch]
                                  mov dword ptr [eax], ecx
                                  call dword ptr [0040A0CCh]
                                  mov ecx, dword ptr [0070F888h]
                                  mov dword ptr [eax], ecx
                                  mov eax, dword ptr [0040A0E4h]
                                  mov eax, dword ptr [eax]
                                  mov dword ptr [0070F890h], eax
                                  call 00007FC740F7D791h
                                  cmp dword ptr [00431410h], ebx
                                  jne 00007FC740F7D67Eh
                                  push 00409B9Eh
                                  call dword ptr [0040A0D4h]
                                  pop ecx
                                  call 00007FC740F7D763h
                                  push 0040B010h
                                  push 0040B00Ch
                                  call 00007FC740F7D74Eh
                                  mov eax, dword ptr [0070F884h]
                                  mov dword ptr [ebp-6Ch], eax
                                  lea eax, dword ptr [ebp-6Ch]
                                  push eax
                                  push dword ptr [0070F880h]
                                  lea eax, dword ptr [ebp-64h]
                                  push eax
                                  lea eax, dword ptr [ebp-70h]
                                  push eax
                                  lea eax, dword ptr [ebp-60h]
                                  push eax
                                  call dword ptr [0040A0DCh]
                                  push 0040B008h
                                  push 0040B000h
                                  call 00007FC740F7D71Bh
                                  Programming Language:
                                  • [C++] VS98 (6.0) SP6 build 8804
                                  • [EXP] VC++ 6.0 SP5 build 8804
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa1e00xa0.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3100000x35a454.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0xa0000x188.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x8bca0x9000799fa6f54ef4176da2990896faea65d8False0.534423828125data6.1345234015658825IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0xa0000x9980x1000d8037d744b539326c06e897625751cc9False0.29345703125data3.503615586181224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0xb0000x30489c0x2700022a8598dc29cad7078c291e94612ce26unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x3100000x35a4540x35b000a19437cf29a158eae9109b8ecb75975dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  R0x3100a40x35a000PE32 executable (GUI) Intel 80386, for MS WindowsEnglishUnited States0.9710664749145508
                                  RT_VERSION0x66a0a40x3b0dataEnglishUnited States1.0116525423728813
                                  DLLImport
                                  KERNEL32.dllWaitForSingleObject, InterlockedIncrement, GetCurrentThreadId, GetCurrentThread, ReadFile, GetFileSize, CreateFileA, MoveFileExA, SizeofResource, TerminateThread, LoadResource, FindResourceA, GetProcAddress, GetModuleHandleW, ExitProcess, GetModuleFileNameA, LocalFree, LocalAlloc, CloseHandle, InterlockedDecrement, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, GlobalAlloc, GlobalFree, QueryPerformanceFrequency, QueryPerformanceCounter, GetTickCount, LockResource, Sleep, GetStartupInfoA, GetModuleHandleA
                                  ADVAPI32.dllStartServiceCtrlDispatcherA, RegisterServiceCtrlHandlerA, ChangeServiceConfig2A, SetServiceStatus, OpenSCManagerA, CreateServiceA, CloseServiceHandle, StartServiceA, CryptGenRandom, CryptAcquireContextA, OpenServiceA
                                  WS2_32.dllclosesocket, recv, send, htonl, ntohl, WSAStartup, inet_ntoa, ioctlsocket, select, htons, socket, connect, inet_addr
                                  MSVCP60.dll??1_Lockit@std@@QAE@XZ, ??0_Lockit@std@@QAE@XZ
                                  iphlpapi.dllGetAdaptersInfo, GetPerAdapterInfo
                                  WININET.dllInternetOpenA, InternetOpenUrlA, InternetCloseHandle
                                  MSVCRT.dll__set_app_type, _stricmp, __p__fmode, __p__commode, _except_handler3, __setusermatherr, _initterm, __getmainargs, _acmdln, _adjust_fdiv, _controlfp, exit, _XcptFilter, _exit, _onexit, __dllonexit, free, ??2@YAPAXI@Z, _ftol, sprintf, _endthreadex, strncpy, rand, _beginthreadex, __CxxFrameHandler, srand, time, __p___argc
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  03/19/24-12:59:26.731566TCP2024298ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 14916180192.168.2.22104.17.244.81
                                  03/19/24-12:59:27.283141TCP2031515ET TROJAN Known Sinkhole Response Kryptos Logic8049162104.17.244.81192.168.2.22
                                  03/19/24-12:59:26.506948UDP2024291ET TROJAN Possible WannaCry DNS Lookup 15456253192.168.2.228.8.8.8
                                  03/19/24-12:59:27.165393TCP2024298ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 14916280192.168.2.22104.17.244.81
                                  03/19/24-12:59:26.837633TCP2031515ET TROJAN Known Sinkhole Response Kryptos Logic8049161104.17.244.81192.168.2.22
                                  03/19/24-12:59:26.963276UDP2024291ET TROJAN Possible WannaCry DNS Lookup 15291753192.168.2.228.8.8.8
                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 19, 2024 12:59:26.617815971 CET4916180192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:26.705202103 CET8049161104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:26.705302000 CET4916180192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:26.731565952 CET4916180192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:26.820549011 CET8049161104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:26.837632895 CET8049161104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:26.837806940 CET4916180192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:26.837909937 CET4916180192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:26.838219881 CET8049161104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:26.838269949 CET4916180192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:26.925255060 CET8049161104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:27.077778101 CET4916280192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:27.165178061 CET8049162104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:27.165236950 CET4916280192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:27.165393114 CET4916280192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:27.252794027 CET8049162104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:27.283140898 CET8049162104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:27.283190012 CET4916280192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:27.283262968 CET4916280192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:27.283427000 CET8049162104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:27.283469915 CET4916280192.168.2.22104.17.244.81
                                  Mar 19, 2024 12:59:27.300116062 CET49163445192.168.2.22214.137.245.2
                                  Mar 19, 2024 12:59:27.370548010 CET8049162104.17.244.81192.168.2.22
                                  Mar 19, 2024 12:59:28.417207956 CET49176445192.168.2.22203.79.193.247
                                  Mar 19, 2024 12:59:29.307251930 CET49185445192.168.2.22120.15.162.62
                                  Mar 19, 2024 12:59:29.540601969 CET49188445192.168.2.22141.67.174.208
                                  Mar 19, 2024 12:59:30.430104017 CET49200445192.168.2.22143.98.163.93
                                  Mar 19, 2024 12:59:30.663769960 CET49203445192.168.2.22211.233.9.32
                                  Mar 19, 2024 12:59:31.320486069 CET49210445192.168.2.22200.171.37.34
                                  Mar 19, 2024 12:59:31.552793026 CET49214445192.168.2.2282.147.32.72
                                  Mar 19, 2024 12:59:31.786947966 CET49217445192.168.2.22110.226.13.154
                                  Mar 19, 2024 12:59:32.441983938 CET49223445192.168.2.2259.78.128.44
                                  Mar 19, 2024 12:59:32.676071882 CET49229445192.168.2.225.26.110.103
                                  Mar 19, 2024 12:59:32.910182953 CET49232445192.168.2.22184.90.137.138
                                  Mar 19, 2024 12:59:33.332968950 CET49237445192.168.2.2249.149.212.33
                                  Mar 19, 2024 12:59:33.565248966 CET49239445192.168.2.22157.87.74.109
                                  Mar 19, 2024 12:59:33.799272060 CET49244445192.168.2.22134.46.137.214
                                  Mar 19, 2024 12:59:34.033356905 CET49247445192.168.2.2292.85.153.197
                                  Mar 19, 2024 12:59:34.454447031 CET49251445192.168.2.22223.117.141.206
                                  Mar 19, 2024 12:59:34.688580990 CET49254445192.168.2.22205.170.59.230
                                  Mar 19, 2024 12:59:34.922548056 CET49259445192.168.2.22167.202.20.98
                                  Mar 19, 2024 12:59:35.156481981 CET49262445192.168.2.22215.232.13.19
                                  Mar 19, 2024 12:59:35.344440937 CET49265445192.168.2.22106.225.177.219
                                  Mar 19, 2024 12:59:35.577620983 CET49267445192.168.2.22120.31.152.218
                                  Mar 19, 2024 12:59:35.811815977 CET49270445192.168.2.22102.6.66.108
                                  Mar 19, 2024 12:59:36.045749903 CET49275445192.168.2.2274.72.249.143
                                  Mar 19, 2024 12:59:36.279599905 CET49278445192.168.2.2224.108.26.189
                                  Mar 19, 2024 12:59:36.466783047 CET49281445192.168.2.2277.103.225.161
                                  Mar 19, 2024 12:59:36.700823069 CET49283445192.168.2.2261.131.243.6
                                  Mar 19, 2024 12:59:36.934916973 CET49286445192.168.2.22223.223.204.191
                                  Mar 19, 2024 12:59:37.168937922 CET49291445192.168.2.2266.58.6.205
                                  Mar 19, 2024 12:59:37.356981993 CET49294445192.168.2.22148.235.105.203
                                  Mar 19, 2024 12:59:37.402921915 CET49295445192.168.2.2263.253.202.201
                                  Mar 19, 2024 12:59:37.590080976 CET49299445192.168.2.22152.160.70.29
                                  Mar 19, 2024 12:59:37.824191093 CET49300445192.168.2.22161.132.93.183
                                  Mar 19, 2024 12:59:38.058177948 CET49303445192.168.2.22138.106.27.189
                                  Mar 19, 2024 12:59:38.292238951 CET49308445192.168.2.22136.62.32.195
                                  Mar 19, 2024 12:59:38.479232073 CET49311445192.168.2.22132.110.238.107
                                  Mar 19, 2024 12:59:38.526160955 CET49312445192.168.2.22174.237.224.230
                                  Mar 19, 2024 12:59:38.713352919 CET49316445192.168.2.2297.103.153.59
                                  Mar 19, 2024 12:59:38.947369099 CET49317445192.168.2.22196.152.41.222
                                  Mar 19, 2024 12:59:39.183029890 CET49320445192.168.2.22136.81.3.67
                                  Mar 19, 2024 12:59:39.369081020 CET49324445192.168.2.22114.71.66.208
                                  Mar 19, 2024 12:59:39.415273905 CET49325445192.168.2.22162.53.105.46
                                  Mar 19, 2024 12:59:39.602384090 CET49326445192.168.2.22176.74.29.67
                                  Mar 19, 2024 12:59:39.649144888 CET49327445192.168.2.22119.35.93.148
                                  Mar 19, 2024 12:59:39.977391958 CET49331445192.168.2.22204.249.107.70
                                  Mar 19, 2024 12:59:40.070523024 CET49334445192.168.2.2246.174.180.99
                                  Mar 19, 2024 12:59:40.304596901 CET49338445192.168.2.22146.29.152.53
                                  Mar 19, 2024 12:59:40.588669062 CET49342445192.168.2.22222.34.195.17
                                  Mar 19, 2024 12:59:40.588826895 CET49343445192.168.2.22137.157.60.35
                                  Mar 19, 2024 12:59:40.725613117 CET49345445192.168.2.22135.39.29.27
                                  Mar 19, 2024 12:59:40.772562981 CET49346445192.168.2.22198.104.2.29
                                  Mar 19, 2024 12:59:41.100188971 CET49350445192.168.2.2275.16.253.158
                                  Mar 19, 2024 12:59:41.193625927 CET49352445192.168.2.2224.120.0.173
                                  Mar 19, 2024 12:59:41.381006002 CET49356445192.168.2.22169.38.35.103
                                  Mar 19, 2024 12:59:41.427711010 CET49358445192.168.2.225.75.228.213
                                  Mar 19, 2024 12:59:41.603502035 CET445493585.75.228.213192.168.2.22
                                  Mar 19, 2024 12:59:41.708488941 CET49361445192.168.2.2299.17.100.173
                                  Mar 19, 2024 12:59:41.708507061 CET49362445192.168.2.2218.137.250.253
                                  Mar 19, 2024 12:59:41.848864079 CET49364445192.168.2.22139.30.212.105
                                  Mar 19, 2024 12:59:41.895603895 CET49365445192.168.2.22161.113.153.108
                                  Mar 19, 2024 12:59:42.113979101 CET49358445192.168.2.225.75.228.213
                                  Mar 19, 2024 12:59:42.223409891 CET49368445192.168.2.2297.243.7.9
                                  Mar 19, 2024 12:59:42.288445950 CET445493585.75.228.213192.168.2.22
                                  Mar 19, 2024 12:59:42.316785097 CET49371445192.168.2.2272.240.199.1
                                  Mar 19, 2024 12:59:42.504060984 CET49375445192.168.2.2264.54.143.46
                                  Mar 19, 2024 12:59:42.550882101 CET49377445192.168.2.22162.21.155.219
                                  Mar 19, 2024 12:59:42.831667900 CET49380445192.168.2.2234.79.68.78
                                  Mar 19, 2024 12:59:42.832103968 CET49381445192.168.2.22177.8.42.72
                                  Mar 19, 2024 12:59:42.973748922 CET49383445192.168.2.22212.57.116.148
                                  Mar 19, 2024 12:59:43.019054890 CET49384445192.168.2.22174.217.188.21
                                  Mar 19, 2024 12:59:43.245457888 CET44549303138.106.27.189192.168.2.22
                                  Mar 19, 2024 12:59:43.346551895 CET49387445192.168.2.22223.34.214.254
                                  Mar 19, 2024 12:59:43.393544912 CET49389445192.168.2.2217.39.203.164
                                  Mar 19, 2024 12:59:43.440156937 CET49391445192.168.2.22145.173.217.224
                                  Mar 19, 2024 12:59:43.627238989 CET49395445192.168.2.2270.153.70.13
                                  Mar 19, 2024 12:59:43.674024105 CET49397445192.168.2.22162.51.30.250
                                  Mar 19, 2024 12:59:43.954986095 CET49400445192.168.2.22111.83.160.62
                                  Mar 19, 2024 12:59:43.955244064 CET49401445192.168.2.2281.34.30.33
                                  Mar 19, 2024 12:59:44.095314026 CET49403445192.168.2.22207.126.224.3
                                  Mar 19, 2024 12:59:44.142471075 CET49404445192.168.2.22158.67.34.169
                                  Mar 19, 2024 12:59:44.469849110 CET49407445192.168.2.22185.111.218.21
                                  Mar 19, 2024 12:59:44.516338110 CET49409445192.168.2.2261.94.223.54
                                  Mar 19, 2024 12:59:44.563302994 CET49411445192.168.2.22168.49.172.217
                                  Mar 19, 2024 12:59:44.750462055 CET49415445192.168.2.2269.199.81.104
                                  Mar 19, 2024 12:59:44.797400951 CET49417445192.168.2.22132.155.243.49
                                  Mar 19, 2024 12:59:45.078097105 CET49420445192.168.2.22151.166.91.109
                                  Mar 19, 2024 12:59:45.078233004 CET49421445192.168.2.2282.154.128.35
                                  Mar 19, 2024 12:59:45.234035015 CET49423445192.168.2.22181.212.33.38
                                  Mar 19, 2024 12:59:45.265261889 CET49424445192.168.2.22188.247.111.198
                                  Mar 19, 2024 12:59:45.405925989 CET49425445192.168.2.22149.54.12.67
                                  Mar 19, 2024 12:59:45.592961073 CET49428445192.168.2.2288.92.98.30
                                  Mar 19, 2024 12:59:45.639672041 CET49430445192.168.2.2227.180.114.81
                                  Mar 19, 2024 12:59:45.686820984 CET49432445192.168.2.22106.57.135.87
                                  Mar 19, 2024 12:59:45.873759031 CET49436445192.168.2.22221.159.228.248
                                  Mar 19, 2024 12:59:45.920386076 CET49438445192.168.2.2295.168.144.129
                                  Mar 19, 2024 12:59:46.201459885 CET49441445192.168.2.22178.109.176.107
                                  Mar 19, 2024 12:59:46.201803923 CET49443445192.168.2.22210.132.94.199
                                  Mar 19, 2024 12:59:46.357723951 CET49444445192.168.2.2232.64.162.39
                                  Mar 19, 2024 12:59:46.389888048 CET49445445192.168.2.22222.180.124.38
                                  Mar 19, 2024 12:59:46.528992891 CET49446445192.168.2.22214.243.185.134
                                  Mar 19, 2024 12:59:46.716425896 CET49450445192.168.2.22220.233.176.92
                                  Mar 19, 2024 12:59:46.763000965 CET49451445192.168.2.22202.143.241.80
                                  Mar 19, 2024 12:59:46.809842110 CET49453445192.168.2.22141.198.244.15
                                  Mar 19, 2024 12:59:46.996777058 CET49457445192.168.2.22175.131.225.61
                                  Mar 19, 2024 12:59:47.052099943 CET49459445192.168.2.22188.234.93.216
                                  Mar 19, 2024 12:59:47.324448109 CET49463445192.168.2.2257.94.68.28
                                  Mar 19, 2024 12:59:47.324456930 CET49464445192.168.2.2271.169.117.113
                                  Mar 19, 2024 12:59:47.420629978 CET49465445192.168.2.22186.218.160.65
                                  Mar 19, 2024 12:59:47.480787039 CET49466445192.168.2.22172.24.128.225
                                  Mar 19, 2024 12:59:47.511733055 CET49467445192.168.2.22116.195.60.145
                                  Mar 19, 2024 12:59:47.651993036 CET49469445192.168.2.2231.44.222.182
                                  Mar 19, 2024 12:59:47.839243889 CET49473445192.168.2.22194.53.56.94
                                  Mar 19, 2024 12:59:47.886008978 CET49475445192.168.2.22117.156.118.51
                                  Mar 19, 2024 12:59:47.932868004 CET49476445192.168.2.22199.125.6.193
                                  Mar 19, 2024 12:59:48.120079994 CET49480445192.168.2.22125.218.37.16
                                  Mar 19, 2024 12:59:48.166908026 CET49481445192.168.2.22113.9.6.69
                                  Mar 19, 2024 12:59:48.447699070 CET49485445192.168.2.22146.6.102.30
                                  Mar 19, 2024 12:59:48.447829962 CET49486445192.168.2.2251.156.107.127
                                  Mar 19, 2024 12:59:48.541511059 CET49487445192.168.2.2244.91.155.218
                                  Mar 19, 2024 12:59:48.619709015 CET49488445192.168.2.2250.73.82.153
                                  Mar 19, 2024 12:59:48.635294914 CET49489445192.168.2.2264.220.69.91
                                  Mar 19, 2024 12:59:48.775463104 CET49491445192.168.2.2295.157.0.161
                                  Mar 19, 2024 12:59:48.962441921 CET49495445192.168.2.2277.187.137.217
                                  Mar 19, 2024 12:59:49.009462118 CET49497445192.168.2.22142.31.6.74
                                  Mar 19, 2024 12:59:49.056421041 CET49499445192.168.2.2252.96.246.205
                                  Mar 19, 2024 12:59:49.243541002 CET49502445192.168.2.2259.94.62.151
                                  Mar 19, 2024 12:59:49.290296078 CET49503445192.168.2.22200.28.158.38
                                  Mar 19, 2024 12:59:49.430620909 CET49506445192.168.2.22176.157.79.150
                                  Mar 19, 2024 12:59:49.571058035 CET49508445192.168.2.22141.139.5.248
                                  Mar 19, 2024 12:59:49.571360111 CET49509445192.168.2.22212.201.187.130
                                  Mar 19, 2024 12:59:49.664365053 CET49510445192.168.2.2243.11.179.189
                                  Mar 19, 2024 12:59:49.742527962 CET49511445192.168.2.22105.43.71.100
                                  Mar 19, 2024 12:59:49.758258104 CET49512445192.168.2.22102.226.176.0
                                  Mar 19, 2024 12:59:49.898513079 CET49514445192.168.2.2246.72.181.238
                                  Mar 19, 2024 12:59:50.086090088 CET49518445192.168.2.22171.228.230.140
                                  Mar 19, 2024 12:59:50.132497072 CET49520445192.168.2.2242.234.30.21
                                  Mar 19, 2024 12:59:50.179481030 CET49522445192.168.2.22129.209.30.107
                                  Mar 19, 2024 12:59:50.366589069 CET49525445192.168.2.22181.108.81.174
                                  Mar 19, 2024 12:59:50.413330078 CET49526445192.168.2.2237.86.103.199
                                  Mar 19, 2024 12:59:50.553647041 CET49529445192.168.2.22165.80.138.168
                                  Mar 19, 2024 12:59:50.694113970 CET49532445192.168.2.2230.39.30.147
                                  Mar 19, 2024 12:59:50.694144011 CET49531445192.168.2.2218.11.29.180
                                  Mar 19, 2024 12:59:50.787672043 CET49533445192.168.2.22205.247.171.169
                                  Mar 19, 2024 12:59:50.865732908 CET49534445192.168.2.2234.58.7.138
                                  Mar 19, 2024 12:59:50.881381035 CET49535445192.168.2.22177.39.82.178
                                  Mar 19, 2024 12:59:51.021583080 CET49537445192.168.2.2221.126.169.110
                                  Mar 19, 2024 12:59:51.209175110 CET49541445192.168.2.2261.50.224.158
                                  Mar 19, 2024 12:59:51.255642891 CET49543445192.168.2.2253.182.115.237
                                  Mar 19, 2024 12:59:51.303138971 CET49544445192.168.2.2275.131.56.237
                                  Mar 19, 2024 12:59:51.443638086 CET49548445192.168.2.22184.117.235.162
                                  Mar 19, 2024 12:59:51.490269899 CET49549445192.168.2.2265.94.71.141
                                  Mar 19, 2024 12:59:51.536757946 CET49550445192.168.2.2273.125.199.200
                                  Mar 19, 2024 12:59:51.677009106 CET49553445192.168.2.2214.100.150.241
                                  Mar 19, 2024 12:59:51.817612886 CET49555445192.168.2.22104.17.108.132
                                  Mar 19, 2024 12:59:51.817827940 CET49556445192.168.2.2271.12.218.12
                                  Mar 19, 2024 12:59:51.910902977 CET49557445192.168.2.22108.57.167.191
                                  Mar 19, 2024 12:59:51.989377975 CET49558445192.168.2.2294.238.9.124
                                  Mar 19, 2024 12:59:52.004981041 CET49559445192.168.2.22176.62.12.77
                                  Mar 19, 2024 12:59:52.145170927 CET49561445192.168.2.22208.211.82.17
                                  Mar 19, 2024 12:59:52.332350969 CET49565445192.168.2.2217.215.250.142
                                  Mar 19, 2024 12:59:52.379468918 CET49567445192.168.2.2257.191.64.216
                                  Mar 19, 2024 12:59:52.426094055 CET49568445192.168.2.22100.101.13.179
                                  Mar 19, 2024 12:59:52.566287994 CET49572445192.168.2.2290.236.148.172
                                  Mar 19, 2024 12:59:52.612900019 CET49573445192.168.2.22170.109.103.226
                                  Mar 19, 2024 12:59:52.659941912 CET49575445192.168.2.22176.159.42.99
                                  Mar 19, 2024 12:59:52.800138950 CET49577445192.168.2.22179.209.54.172
                                  Mar 19, 2024 12:59:52.940535069 CET49580445192.168.2.2220.71.50.94
                                  Mar 19, 2024 12:59:52.942086935 CET49579445192.168.2.22165.239.107.176
                                  Mar 19, 2024 12:59:53.034409046 CET49582445192.168.2.22199.159.238.94
                                  Mar 19, 2024 12:59:53.112104893 CET49583445192.168.2.2274.231.185.198
                                  Mar 19, 2024 12:59:53.127573967 CET49584445192.168.2.22158.119.52.124
                                  Mar 19, 2024 12:59:53.280296087 CET49585445192.168.2.228.238.189.234
                                  Mar 19, 2024 12:59:53.455248117 CET49589445192.168.2.2286.189.77.142
                                  Mar 19, 2024 12:59:53.455570936 CET49590445192.168.2.2285.167.8.93
                                  Mar 19, 2024 12:59:53.502120972 CET49591445192.168.2.22186.148.8.36
                                  Mar 19, 2024 12:59:53.548902988 CET49592445192.168.2.22166.229.45.96
                                  Mar 19, 2024 12:59:53.689234018 CET49593445192.168.2.2294.202.220.239
                                  Mar 19, 2024 12:59:53.736212015 CET49594445192.168.2.2220.1.54.11
                                  Mar 19, 2024 12:59:53.783165932 CET49595445192.168.2.22131.170.47.20
                                  Mar 19, 2024 12:59:53.923243046 CET49596445192.168.2.22194.57.140.191
                                  Mar 19, 2024 12:59:54.063760042 CET49597445192.168.2.2215.110.97.169
                                  Mar 19, 2024 12:59:54.063760042 CET49598445192.168.2.22125.155.72.194
                                  Mar 19, 2024 12:59:54.157269955 CET49599445192.168.2.22176.220.195.122
                                  Mar 19, 2024 12:59:54.235512972 CET49600445192.168.2.22107.32.195.247
                                  Mar 19, 2024 12:59:54.250972033 CET49601445192.168.2.22191.229.51.95
                                  Mar 19, 2024 12:59:54.391395092 CET49602445192.168.2.22212.139.44.172
                                  Mar 19, 2024 12:59:54.578615904 CET49603445192.168.2.22221.183.86.175
                                  Mar 19, 2024 12:59:54.582029104 CET49604445192.168.2.22154.249.38.166
                                  Mar 19, 2024 12:59:54.625490904 CET49605445192.168.2.22147.80.60.47
                                  Mar 19, 2024 12:59:54.672156096 CET49606445192.168.2.2230.66.84.19
                                  Mar 19, 2024 12:59:54.789680958 CET44549604154.249.38.166192.168.2.22
                                  Mar 19, 2024 12:59:54.812691927 CET49607445192.168.2.2285.124.108.140
                                  Mar 19, 2024 12:59:54.859338045 CET49608445192.168.2.22187.217.33.119
                                  Mar 19, 2024 12:59:54.906037092 CET49609445192.168.2.22161.204.48.16
                                  Mar 19, 2024 12:59:55.046658039 CET49610445192.168.2.222.110.90.46
                                  Mar 19, 2024 12:59:55.187022924 CET49611445192.168.2.2244.17.153.153
                                  Mar 19, 2024 12:59:55.187411070 CET49612445192.168.2.22122.80.204.119
                                  Mar 19, 2024 12:59:55.280813932 CET49613445192.168.2.22184.159.80.182
                                  Mar 19, 2024 12:59:55.296026945 CET49604445192.168.2.22154.249.38.166
                                  Mar 19, 2024 12:59:55.374203920 CET49614445192.168.2.22215.211.20.137
                                  Mar 19, 2024 12:59:55.374403954 CET49615445192.168.2.2258.91.218.108
                                  Mar 19, 2024 12:59:55.467890024 CET49616445192.168.2.22202.158.247.182
                                  Mar 19, 2024 12:59:55.503129959 CET44549604154.249.38.166192.168.2.22
                                  Mar 19, 2024 12:59:55.514545918 CET49617445192.168.2.22178.18.39.27
                                  Mar 19, 2024 12:59:55.701826096 CET49618445192.168.2.22140.156.139.139
                                  Mar 19, 2024 12:59:55.701865911 CET49619445192.168.2.2239.130.209.92
                                  Mar 19, 2024 12:59:55.748631954 CET49620445192.168.2.2264.55.251.213
                                  Mar 19, 2024 12:59:55.795300007 CET49621445192.168.2.22129.85.252.133
                                  Mar 19, 2024 12:59:55.796047926 CET44549616202.158.247.182192.168.2.22
                                  Mar 19, 2024 12:59:55.951529980 CET49622445192.168.2.22183.158.47.201
                                  Mar 19, 2024 12:59:55.982520103 CET49623445192.168.2.2221.151.31.205
                                  Mar 19, 2024 12:59:56.032308102 CET49624445192.168.2.22132.74.149.245
                                  Mar 19, 2024 12:59:56.169899940 CET49625445192.168.2.22212.177.70.229
                                  Mar 19, 2024 12:59:56.309901953 CET49616445192.168.2.22202.158.247.182
                                  Mar 19, 2024 12:59:56.535897970 CET49626445192.168.2.22170.131.124.206
                                  Mar 19, 2024 12:59:56.536120892 CET49627445192.168.2.22132.37.27.147
                                  Mar 19, 2024 12:59:56.637828112 CET49628445192.168.2.22154.51.10.47
                                  Mar 19, 2024 12:59:56.637911081 CET49629445192.168.2.22113.239.2.121
                                  Mar 19, 2024 12:59:56.638051987 CET49630445192.168.2.22116.35.107.200
                                  Mar 19, 2024 12:59:56.638212919 CET44549616202.158.247.182192.168.2.22
                                  Mar 19, 2024 12:59:56.732157946 CET49631445192.168.2.22151.14.50.42
                                  Mar 19, 2024 12:59:56.732239008 CET49632445192.168.2.22158.226.220.137
                                  Mar 19, 2024 12:59:56.840635061 CET49633445192.168.2.2248.94.176.35
                                  Mar 19, 2024 12:59:57.011717081 CET49634445192.168.2.22133.158.40.48
                                  Mar 19, 2024 12:59:57.096165895 CET49635445192.168.2.22201.242.74.131
                                  Mar 19, 2024 12:59:57.096354961 CET49636445192.168.2.22203.171.114.130
                                  Mar 19, 2024 12:59:57.105637074 CET49637445192.168.2.2285.132.142.119
                                  Mar 19, 2024 12:59:57.199188948 CET49638445192.168.2.22162.164.12.31
                                  Mar 19, 2024 12:59:57.199347973 CET49639445192.168.2.2272.31.99.189
                                  Mar 19, 2024 12:59:57.292939901 CET49640445192.168.2.22123.174.233.12
                                  Mar 19, 2024 12:59:57.389767885 CET44549636203.171.114.130192.168.2.22
                                  Mar 19, 2024 12:59:57.480633974 CET49641445192.168.2.2262.104.233.177
                                  Mar 19, 2024 12:59:57.651905060 CET49642445192.168.2.2281.62.36.165
                                  Mar 19, 2024 12:59:57.651932001 CET49643445192.168.2.22162.27.135.93
                                  Mar 19, 2024 12:59:57.761107922 CET49644445192.168.2.22158.61.92.35
                                  Mar 19, 2024 12:59:57.761107922 CET49645445192.168.2.2297.100.26.53
                                  Mar 19, 2024 12:59:57.761142969 CET49646445192.168.2.22192.142.45.6
                                  Mar 19, 2024 12:59:57.854413033 CET49647445192.168.2.2237.220.88.46
                                  Mar 19, 2024 12:59:57.854470968 CET49648445192.168.2.226.73.76.69
                                  Mar 19, 2024 12:59:57.901093006 CET49636445192.168.2.22203.171.114.130
                                  Mar 19, 2024 12:59:57.963566065 CET49649445192.168.2.2291.36.12.140
                                  Mar 19, 2024 12:59:58.119710922 CET49650445192.168.2.22112.72.148.96
                                  Mar 19, 2024 12:59:58.195919037 CET44549636203.171.114.130192.168.2.22
                                  Mar 19, 2024 12:59:58.213311911 CET49651445192.168.2.22143.95.129.224
                                  Mar 19, 2024 12:59:58.213753939 CET49652445192.168.2.22176.28.118.232
                                  Mar 19, 2024 12:59:58.228744030 CET49653445192.168.2.22136.159.215.0
                                  Mar 19, 2024 12:59:58.322464943 CET49654445192.168.2.22129.242.93.34
                                  Mar 19, 2024 12:59:58.322757006 CET49655445192.168.2.2237.48.90.207
                                  Mar 19, 2024 12:59:58.416043043 CET49656445192.168.2.22153.174.7.1
                                  Mar 19, 2024 12:59:58.603276014 CET49657445192.168.2.22196.113.21.142
                                  Mar 19, 2024 12:59:58.785021067 CET49658445192.168.2.22147.14.242.12
                                  Mar 19, 2024 12:59:58.785140991 CET49659445192.168.2.2228.6.239.213
                                  Mar 19, 2024 12:59:58.884417057 CET49660445192.168.2.22201.129.102.147
                                  Mar 19, 2024 12:59:58.884821892 CET49661445192.168.2.22216.19.53.67
                                  Mar 19, 2024 12:59:58.885143995 CET49662445192.168.2.22106.165.33.38
                                  Mar 19, 2024 12:59:58.977579117 CET49663445192.168.2.2229.139.183.139
                                  Mar 19, 2024 12:59:58.977655888 CET49664445192.168.2.22148.20.47.185
                                  Mar 19, 2024 12:59:59.086797953 CET49665445192.168.2.22213.17.237.37
                                  Mar 19, 2024 12:59:59.242928028 CET49666445192.168.2.2287.46.190.0
                                  Mar 19, 2024 12:59:59.336508036 CET49667445192.168.2.22214.226.39.253
                                  Mar 19, 2024 12:59:59.336632013 CET49668445192.168.2.2227.191.167.194
                                  Mar 19, 2024 12:59:59.352072954 CET49669445192.168.2.22135.222.6.77
                                  Mar 19, 2024 12:59:59.445627928 CET49670445192.168.2.2291.165.222.113
                                  Mar 19, 2024 12:59:59.446016073 CET49671445192.168.2.2240.187.230.167
                                  Mar 19, 2024 12:59:59.492598057 CET49672445192.168.2.2287.216.160.164
                                  Mar 19, 2024 12:59:59.539395094 CET49673445192.168.2.2242.148.15.90
                                  Mar 19, 2024 12:59:59.726752996 CET49674445192.168.2.2291.187.42.135
                                  Mar 19, 2024 12:59:59.898850918 CET49675445192.168.2.22106.157.92.218
                                  Mar 19, 2024 12:59:59.899173021 CET49676445192.168.2.22219.76.4.79
                                  Mar 19, 2024 13:00:00.007371902 CET49677445192.168.2.22205.206.53.56
                                  Mar 19, 2024 13:00:00.007414103 CET49678445192.168.2.22149.188.194.77
                                  Mar 19, 2024 13:00:00.007646084 CET49679445192.168.2.22129.168.118.9
                                  Mar 19, 2024 13:00:00.100912094 CET49681445192.168.2.22142.28.123.129
                                  Mar 19, 2024 13:00:00.100919962 CET49680445192.168.2.22149.231.84.234
                                  Mar 19, 2024 13:00:00.210094929 CET49682445192.168.2.22222.153.210.102
                                  Mar 19, 2024 13:00:00.366183996 CET49683445192.168.2.2264.123.217.99
                                  Mar 19, 2024 13:00:00.459760904 CET49684445192.168.2.2261.5.56.98
                                  Mar 19, 2024 13:00:00.459769011 CET49685445192.168.2.2249.47.136.204
                                  Mar 19, 2024 13:00:00.475270033 CET49686445192.168.2.225.193.22.125
                                  Mar 19, 2024 13:00:00.568876982 CET49687445192.168.2.2280.120.103.102
                                  Mar 19, 2024 13:00:00.569190979 CET49688445192.168.2.2264.254.249.189
                                  Mar 19, 2024 13:00:00.615712881 CET49689445192.168.2.22118.221.182.236
                                  Mar 19, 2024 13:00:00.662440062 CET49690445192.168.2.22180.164.71.7
                                  Mar 19, 2024 13:00:00.851169109 CET49691445192.168.2.22119.71.205.231
                                  Mar 19, 2024 13:00:01.021384001 CET49692445192.168.2.22185.171.145.224
                                  Mar 19, 2024 13:00:01.021903992 CET49693445192.168.2.2220.130.16.226
                                  Mar 19, 2024 13:00:01.130505085 CET49694445192.168.2.22139.96.26.201
                                  Mar 19, 2024 13:00:01.130506039 CET49695445192.168.2.22188.182.177.110
                                  Mar 19, 2024 13:00:01.130928993 CET49696445192.168.2.22131.37.229.158
                                  Mar 19, 2024 13:00:01.224081993 CET49697445192.168.2.22159.226.252.149
                                  Mar 19, 2024 13:00:01.224112034 CET49698445192.168.2.22110.174.178.174
                                  Mar 19, 2024 13:00:01.333539009 CET49699445192.168.2.22115.212.175.79
                                  Mar 19, 2024 13:00:01.489245892 CET49700445192.168.2.22190.213.32.37
                                  Mar 19, 2024 13:00:01.505013943 CET49701445192.168.2.22173.186.164.4
                                  Mar 19, 2024 13:00:01.583379030 CET49703445192.168.2.22215.242.160.1
                                  Mar 19, 2024 13:00:01.598660946 CET49704445192.168.2.2271.170.251.169
                                  Mar 19, 2024 13:00:01.691972971 CET49705445192.168.2.2298.40.229.82
                                  Mar 19, 2024 13:00:01.692105055 CET49706445192.168.2.2214.218.218.74
                                  Mar 19, 2024 13:00:01.739450932 CET49707445192.168.2.2235.160.146.149
                                  Mar 19, 2024 13:00:01.785594940 CET49708445192.168.2.2294.35.174.226
                                  Mar 19, 2024 13:00:01.972806931 CET49709445192.168.2.22112.119.8.65
                                  Mar 19, 2024 13:00:02.144536018 CET49710445192.168.2.22177.2.160.134
                                  Mar 19, 2024 13:00:02.144650936 CET49711445192.168.2.22125.220.152.17
                                  Mar 19, 2024 13:00:02.253675938 CET49712445192.168.2.22147.70.80.199
                                  Mar 19, 2024 13:00:02.253675938 CET49713445192.168.2.22198.25.218.232
                                  Mar 19, 2024 13:00:02.253830910 CET49714445192.168.2.2271.100.202.250
                                  Mar 19, 2024 13:00:02.347248077 CET49715445192.168.2.222.40.218.113
                                  Mar 19, 2024 13:00:02.347289085 CET49716445192.168.2.2218.76.155.175
                                  Mar 19, 2024 13:00:02.456512928 CET49717445192.168.2.22140.253.98.249
                                  Mar 19, 2024 13:00:02.612591028 CET49718445192.168.2.223.239.24.217
                                  Mar 19, 2024 13:00:02.628115892 CET49719445192.168.2.2268.161.147.73
                                  Mar 19, 2024 13:00:02.706145048 CET49720445192.168.2.22123.159.142.114
                                  Mar 19, 2024 13:00:02.706212997 CET49721445192.168.2.22197.204.215.103
                                  Mar 19, 2024 13:00:02.721554995 CET49722445192.168.2.2267.54.254.150
                                  Mar 19, 2024 13:00:02.815283060 CET49723445192.168.2.2212.165.139.53
                                  Mar 19, 2024 13:00:02.815329075 CET49724445192.168.2.22170.76.69.88
                                  Mar 19, 2024 13:00:02.862312078 CET49725445192.168.2.2254.229.52.9
                                  Mar 19, 2024 13:00:02.908807993 CET49726445192.168.2.2269.155.30.244
                                  Mar 19, 2024 13:00:03.096024036 CET49727445192.168.2.22198.134.147.252
                                  Mar 19, 2024 13:00:03.270848989 CET49728445192.168.2.22118.90.2.158
                                  Mar 19, 2024 13:00:03.270966053 CET49729445192.168.2.22204.126.37.4
                                  Mar 19, 2024 13:00:03.376971960 CET49730445192.168.2.22176.46.4.121
                                  Mar 19, 2024 13:00:03.377089024 CET49731445192.168.2.22198.254.37.18
                                  Mar 19, 2024 13:00:03.377170086 CET49732445192.168.2.22106.106.74.71
                                  Mar 19, 2024 13:00:03.377289057 CET49733445192.168.2.22164.143.13.49
                                  Mar 19, 2024 13:00:03.470710993 CET49734445192.168.2.22120.236.194.52
                                  Mar 19, 2024 13:00:03.471163988 CET49735445192.168.2.22136.169.212.0
                                  Mar 19, 2024 13:00:03.580173016 CET49736445192.168.2.22132.243.77.99
                                  Mar 19, 2024 13:00:03.736011028 CET49737445192.168.2.22175.154.24.244
                                  Mar 19, 2024 13:00:03.751565933 CET49738445192.168.2.2227.215.228.95
                                  Mar 19, 2024 13:00:03.829440117 CET49739445192.168.2.22176.243.101.64
                                  Mar 19, 2024 13:00:03.829822063 CET49740445192.168.2.2265.189.166.92
                                  Mar 19, 2024 13:00:03.844763041 CET49741445192.168.2.22169.56.106.90
                                  Mar 19, 2024 13:00:03.938496113 CET49742445192.168.2.22116.42.71.36
                                  Mar 19, 2024 13:00:03.938592911 CET49743445192.168.2.22188.248.218.30
                                  Mar 19, 2024 13:00:03.985194921 CET49744445192.168.2.22197.38.104.23
                                  Mar 19, 2024 13:00:04.032012939 CET49745445192.168.2.2236.128.200.136
                                  Mar 19, 2024 13:00:04.219455004 CET49746445192.168.2.22198.122.228.181
                                  Mar 19, 2024 13:00:04.391585112 CET49747445192.168.2.22174.89.235.13
                                  Mar 19, 2024 13:00:04.391932964 CET49748445192.168.2.2218.143.85.11
                                  Mar 19, 2024 13:00:04.499993086 CET49749445192.168.2.2212.1.106.149
                                  Mar 19, 2024 13:00:04.500262976 CET49750445192.168.2.22105.163.36.208
                                  Mar 19, 2024 13:00:04.500603914 CET49751445192.168.2.22128.13.176.228
                                  Mar 19, 2024 13:00:04.500925064 CET49752445192.168.2.2297.93.75.193
                                  Mar 19, 2024 13:00:04.593630075 CET49753445192.168.2.2268.14.229.153
                                  Mar 19, 2024 13:00:04.593719006 CET49754445192.168.2.22101.234.226.3
                                  Mar 19, 2024 13:00:04.702954054 CET49755445192.168.2.22138.44.154.38
                                  Mar 19, 2024 13:00:04.858916998 CET49756445192.168.2.22219.172.167.154
                                  Mar 19, 2024 13:00:04.874386072 CET49757445192.168.2.22220.32.79.137
                                  Mar 19, 2024 13:00:04.952491045 CET49758445192.168.2.222.121.138.26
                                  Mar 19, 2024 13:00:04.952625990 CET49759445192.168.2.229.96.238.236
                                  Mar 19, 2024 13:00:04.968143940 CET49760445192.168.2.22107.14.139.224
                                  Mar 19, 2024 13:00:05.061582088 CET49761445192.168.2.2226.205.175.224
                                  Mar 19, 2024 13:00:05.061732054 CET49762445192.168.2.22147.164.247.100
                                  Mar 19, 2024 13:00:05.108403921 CET49763445192.168.2.22136.75.115.59
                                  Mar 19, 2024 13:00:05.124792099 CET49764445192.168.2.2259.196.215.236
                                  Mar 19, 2024 13:00:05.155184984 CET49765445192.168.2.2226.37.225.237
                                  Mar 19, 2024 13:00:05.342474937 CET49766445192.168.2.22115.54.121.80
                                  Mar 19, 2024 13:00:05.514182091 CET49767445192.168.2.2288.116.56.48
                                  Mar 19, 2024 13:00:05.514229059 CET49768445192.168.2.2242.83.208.175
                                  Mar 19, 2024 13:00:05.623209000 CET49769445192.168.2.22102.51.11.165
                                  Mar 19, 2024 13:00:05.623374939 CET49770445192.168.2.22199.172.246.202
                                  Mar 19, 2024 13:00:05.623467922 CET49772445192.168.2.22216.91.216.92
                                  Mar 19, 2024 13:00:05.623469114 CET49771445192.168.2.2221.72.200.48
                                  Mar 19, 2024 13:00:05.718297958 CET49773445192.168.2.22200.11.231.254
                                  Mar 19, 2024 13:00:05.718400002 CET49774445192.168.2.22138.140.209.170
                                  Mar 19, 2024 13:00:05.826061010 CET49775445192.168.2.2239.93.97.244
                                  Mar 19, 2024 13:00:05.982192039 CET49776445192.168.2.2257.104.217.184
                                  Mar 19, 2024 13:00:05.997587919 CET49777445192.168.2.22122.191.234.206
                                  Mar 19, 2024 13:00:06.076474905 CET49778445192.168.2.22205.27.71.224
                                  Mar 19, 2024 13:00:06.076622963 CET49779445192.168.2.22185.22.159.186
                                  Mar 19, 2024 13:00:06.091219902 CET49780445192.168.2.22180.217.111.193
                                  Mar 19, 2024 13:00:06.185142994 CET49781445192.168.2.22152.109.38.26
                                  Mar 19, 2024 13:00:06.185265064 CET49782445192.168.2.22152.206.234.248
                                  Mar 19, 2024 13:00:06.231812000 CET49783445192.168.2.2227.24.172.27
                                  Mar 19, 2024 13:00:06.247423887 CET49784445192.168.2.22148.17.170.250
                                  Mar 19, 2024 13:00:06.278754950 CET49785445192.168.2.2229.175.48.22
                                  Mar 19, 2024 13:00:06.465926886 CET49786445192.168.2.2219.243.49.171
                                  Mar 19, 2024 13:00:06.637821913 CET49787445192.168.2.22106.212.73.219
                                  Mar 19, 2024 13:00:06.637891054 CET49788445192.168.2.22147.246.139.59
                                  Mar 19, 2024 13:00:06.746711969 CET49789445192.168.2.226.8.153.55
                                  Mar 19, 2024 13:00:06.747081995 CET49791445192.168.2.22161.147.235.198
                                  Mar 19, 2024 13:00:06.747503042 CET49792445192.168.2.22190.231.7.196
                                  Mar 19, 2024 13:00:06.747503996 CET49790445192.168.2.22219.36.107.216
                                  Mar 19, 2024 13:00:06.762984991 CET49793445192.168.2.22214.159.201.75
                                  Mar 19, 2024 13:00:06.840192080 CET49794445192.168.2.2276.124.122.223
                                  Mar 19, 2024 13:00:06.840405941 CET49795445192.168.2.22160.85.166.139
                                  Mar 19, 2024 13:00:06.949680090 CET49796445192.168.2.22165.142.245.220
                                  Mar 19, 2024 13:00:07.105701923 CET49797445192.168.2.22135.123.39.190
                                  Mar 19, 2024 13:00:07.121129036 CET49798445192.168.2.2278.35.7.169
                                  Mar 19, 2024 13:00:07.199481010 CET49800445192.168.2.2276.188.114.184
                                  Mar 19, 2024 13:00:07.199528933 CET49799445192.168.2.22177.223.53.224
                                  Mar 19, 2024 13:00:07.214610100 CET49801445192.168.2.22156.94.216.243
                                  Mar 19, 2024 13:00:07.308320045 CET49802445192.168.2.2266.31.151.211
                                  Mar 19, 2024 13:00:07.308610916 CET49803445192.168.2.22109.155.105.122
                                  Mar 19, 2024 13:00:07.355084896 CET49804445192.168.2.2274.145.197.25
                                  Mar 19, 2024 13:00:07.370435953 CET49805445192.168.2.2256.163.2.100
                                  Mar 19, 2024 13:00:07.401736021 CET49806445192.168.2.22183.3.178.100
                                  Mar 19, 2024 13:00:07.589083910 CET49807445192.168.2.22138.243.55.41
                                  Mar 19, 2024 13:00:07.760696888 CET49808445192.168.2.22189.0.242.44
                                  Mar 19, 2024 13:00:07.776137114 CET49809445192.168.2.22139.63.116.81
                                  Mar 19, 2024 13:00:07.869627953 CET49810445192.168.2.22149.136.216.70
                                  Mar 19, 2024 13:00:07.869854927 CET49811445192.168.2.2236.135.36.7
                                  Mar 19, 2024 13:00:07.870069027 CET49812445192.168.2.22150.170.164.117
                                  Mar 19, 2024 13:00:07.885215998 CET49813445192.168.2.2234.147.91.142
                                  Mar 19, 2024 13:00:07.885412931 CET49814445192.168.2.2278.167.157.40
                                  Mar 19, 2024 13:00:07.963172913 CET49815445192.168.2.221.170.135.252
                                  Mar 19, 2024 13:00:07.963253021 CET49816445192.168.2.2299.214.113.187
                                  Mar 19, 2024 13:00:08.072443008 CET49817445192.168.2.22174.143.252.156
                                  Mar 19, 2024 13:00:08.228528023 CET49818445192.168.2.22204.127.189.71
                                  Mar 19, 2024 13:00:08.244194031 CET49819445192.168.2.22143.50.52.46
                                  Mar 19, 2024 13:00:08.291352987 CET49820445192.168.2.2291.79.50.50
                                  Mar 19, 2024 13:00:08.322052002 CET49821445192.168.2.2286.168.76.45
                                  Mar 19, 2024 13:00:08.322499990 CET49822445192.168.2.22154.25.120.225
                                  Mar 19, 2024 13:00:08.337783098 CET49823445192.168.2.2218.188.84.117
                                  Mar 19, 2024 13:00:08.431349039 CET49824445192.168.2.22219.241.141.204
                                  Mar 19, 2024 13:00:08.431353092 CET49825445192.168.2.2223.89.55.92
                                  Mar 19, 2024 13:00:08.478125095 CET49826445192.168.2.2231.141.116.235
                                  Mar 19, 2024 13:00:08.493594885 CET49827445192.168.2.2277.191.157.219
                                  Mar 19, 2024 13:00:08.524838924 CET49828445192.168.2.22129.154.186.116
                                  Mar 19, 2024 13:00:08.712214947 CET49829445192.168.2.2246.28.216.35
                                  Mar 19, 2024 13:00:08.884268045 CET49830445192.168.2.2256.103.73.203
                                  Mar 19, 2024 13:00:08.899383068 CET49831445192.168.2.22193.224.14.113
                                  Mar 19, 2024 13:00:08.993041992 CET49832445192.168.2.22113.161.74.198
                                  Mar 19, 2024 13:00:08.993181944 CET49833445192.168.2.22158.149.160.8
                                  Mar 19, 2024 13:00:09.008433104 CET49834445192.168.2.2222.94.129.209
                                  Mar 19, 2024 13:00:09.008594990 CET49835445192.168.2.22164.175.23.251
                                  Mar 19, 2024 13:00:09.008980989 CET49836445192.168.2.22178.93.136.97
                                  Mar 19, 2024 13:00:09.087642908 CET49837445192.168.2.2285.93.150.186
                                  Mar 19, 2024 13:00:09.087704897 CET49838445192.168.2.22101.55.158.105
                                  Mar 19, 2024 13:00:09.196014881 CET49839445192.168.2.2249.24.189.209
                                  Mar 19, 2024 13:00:09.291017056 CET4454983785.93.150.186192.168.2.22
                                  Mar 19, 2024 13:00:09.352236032 CET49840445192.168.2.2243.64.93.207
                                  Mar 19, 2024 13:00:09.367897987 CET49841445192.168.2.2257.43.210.149
                                  Mar 19, 2024 13:00:09.415339947 CET49842445192.168.2.22169.107.235.152
                                  Mar 19, 2024 13:00:09.445302010 CET49843445192.168.2.2264.112.144.196
                                  Mar 19, 2024 13:00:09.445394039 CET49844445192.168.2.2243.53.66.113
                                  Mar 19, 2024 13:00:09.461177111 CET49845445192.168.2.2258.123.78.126
                                  Mar 19, 2024 13:00:09.554608107 CET49846445192.168.2.22117.41.81.110
                                  Mar 19, 2024 13:00:09.554830074 CET49847445192.168.2.2296.72.23.9
                                  Mar 19, 2024 13:00:09.601363897 CET49848445192.168.2.2280.41.161.241
                                  Mar 19, 2024 13:00:09.617017031 CET49849445192.168.2.22130.51.237.124
                                  Mar 19, 2024 13:00:09.648013115 CET49850445192.168.2.22101.83.135.132
                                  Mar 19, 2024 13:00:09.711276054 CET49851445192.168.2.2272.219.198.47
                                  Mar 19, 2024 13:00:09.803906918 CET49837445192.168.2.2285.93.150.186
                                  Mar 19, 2024 13:00:09.835525036 CET49852445192.168.2.22148.241.67.94
                                  Mar 19, 2024 13:00:10.006954908 CET49853445192.168.2.2281.13.102.164
                                  Mar 19, 2024 13:00:10.008765936 CET4454983785.93.150.186192.168.2.22
                                  Mar 19, 2024 13:00:10.022618055 CET49854445192.168.2.2282.235.37.139
                                  Mar 19, 2024 13:00:10.116164923 CET49855445192.168.2.2287.213.145.215
                                  Mar 19, 2024 13:00:10.131742954 CET49856445192.168.2.2287.52.236.18
                                  Mar 19, 2024 13:00:10.131865025 CET49857445192.168.2.22216.177.48.252
                                  Mar 19, 2024 13:00:10.131894112 CET49858445192.168.2.22110.33.225.204
                                  Mar 19, 2024 13:00:10.132061958 CET49859445192.168.2.2249.210.68.56
                                  Mar 19, 2024 13:00:10.209973097 CET49860445192.168.2.2240.137.151.117
                                  Mar 19, 2024 13:00:10.319025040 CET49862445192.168.2.22107.3.40.45
                                  Mar 19, 2024 13:00:10.475187063 CET49863445192.168.2.22158.143.19.97
                                  Mar 19, 2024 13:00:10.490483999 CET49864445192.168.2.2266.21.114.26
                                  Mar 19, 2024 13:00:10.537847996 CET49865445192.168.2.2238.109.226.240
                                  Mar 19, 2024 13:00:10.569317102 CET49866445192.168.2.22115.32.225.65
                                  Mar 19, 2024 13:00:10.569550037 CET49867445192.168.2.2270.192.7.142
                                  Mar 19, 2024 13:00:10.584222078 CET49868445192.168.2.22209.119.240.196
                                  Mar 19, 2024 13:00:10.677937031 CET49869445192.168.2.2258.43.140.35
                                  Mar 19, 2024 13:00:10.678395033 CET49870445192.168.2.2289.72.30.172
                                  Mar 19, 2024 13:00:10.724730015 CET49871445192.168.2.22167.149.245.132
                                  Mar 19, 2024 13:00:10.740428925 CET49872445192.168.2.22194.4.17.188
                                  Mar 19, 2024 13:00:10.771656036 CET49873445192.168.2.22151.49.64.247
                                  Mar 19, 2024 13:00:10.833868980 CET49874445192.168.2.2276.253.205.230
                                  Mar 19, 2024 13:00:10.958456039 CET49875445192.168.2.2275.108.168.203
                                  Mar 19, 2024 13:00:11.037240982 CET49876445192.168.2.22184.202.235.59
                                  Mar 19, 2024 13:00:11.149970055 CET49877445192.168.2.22183.178.42.245
                                  Mar 19, 2024 13:00:11.150068045 CET49878445192.168.2.224.91.53.110
                                  Mar 19, 2024 13:00:11.254837036 CET49879445192.168.2.2293.179.86.193
                                  Mar 19, 2024 13:00:11.254893064 CET49880445192.168.2.22157.146.82.133
                                  Mar 19, 2024 13:00:11.254935980 CET49881445192.168.2.22154.110.19.252
                                  Mar 19, 2024 13:00:11.255101919 CET49882445192.168.2.22220.156.123.118
                                  Mar 19, 2024 13:00:11.255403996 CET49883445192.168.2.22207.124.181.122
                                  Mar 19, 2024 13:00:11.332844019 CET49884445192.168.2.22161.222.15.152
                                  Mar 19, 2024 13:00:11.332942963 CET49885445192.168.2.22219.225.188.194
                                  Mar 19, 2024 13:00:11.442208052 CET49886445192.168.2.2234.153.232.22
                                  Mar 19, 2024 13:00:11.598557949 CET49887445192.168.2.22151.220.107.22
                                  Mar 19, 2024 13:00:11.613852024 CET49888445192.168.2.22128.218.137.166
                                  Mar 19, 2024 13:00:11.660569906 CET49889445192.168.2.22210.42.45.139
                                  Mar 19, 2024 13:00:11.691803932 CET49890445192.168.2.2298.22.18.81
                                  Mar 19, 2024 13:00:11.691946983 CET49891445192.168.2.22185.161.75.21
                                  Mar 19, 2024 13:00:11.707215071 CET49892445192.168.2.2258.228.118.103
                                  Mar 19, 2024 13:00:11.800899029 CET49893445192.168.2.22161.179.168.184
                                  Mar 19, 2024 13:00:11.800987959 CET49894445192.168.2.2272.193.178.235
                                  Mar 19, 2024 13:00:11.848505974 CET49895445192.168.2.2272.77.103.32
                                  Mar 19, 2024 13:00:11.863935947 CET49896445192.168.2.22178.168.168.36
                                  Mar 19, 2024 13:00:11.894666910 CET49897445192.168.2.22161.241.138.204
                                  Mar 19, 2024 13:00:11.956804991 CET49898445192.168.2.2289.55.127.215
                                  Mar 19, 2024 13:00:12.082000971 CET49899445192.168.2.2211.25.244.199
                                  Mar 19, 2024 13:00:12.160243034 CET49900445192.168.2.2227.118.41.77
                                  Mar 19, 2024 13:00:12.269254923 CET49901445192.168.2.22139.110.30.40
                                  Mar 19, 2024 13:00:12.269510031 CET49902445192.168.2.2263.26.237.88
                                  Mar 19, 2024 13:00:12.284995079 CET49903445192.168.2.2245.214.149.37
                                  Mar 19, 2024 13:00:12.378243923 CET49904445192.168.2.2252.219.132.31
                                  Mar 19, 2024 13:00:12.378478050 CET49906445192.168.2.22197.222.140.238
                                  Mar 19, 2024 13:00:12.378556967 CET49905445192.168.2.2294.167.25.193
                                  Mar 19, 2024 13:00:12.378798008 CET49907445192.168.2.2293.224.212.50
                                  Mar 19, 2024 13:00:12.378973007 CET49908445192.168.2.22212.141.103.197
                                  Mar 19, 2024 13:00:12.456357956 CET49909445192.168.2.22142.246.97.110
                                  Mar 19, 2024 13:00:12.456562996 CET49910445192.168.2.2227.199.60.46
                                  Mar 19, 2024 13:00:12.565468073 CET49911445192.168.2.22207.22.133.235
                                  Mar 19, 2024 13:00:12.721849918 CET49912445192.168.2.22218.95.210.45
                                  Mar 19, 2024 13:00:12.737140894 CET49913445192.168.2.2299.86.180.201
                                  Mar 19, 2024 13:00:12.783862114 CET49914445192.168.2.22179.86.49.183
                                  Mar 19, 2024 13:00:12.815043926 CET49915445192.168.2.2222.212.166.190
                                  Mar 19, 2024 13:00:12.815197945 CET49916445192.168.2.22138.0.183.163
                                  Mar 19, 2024 13:00:12.830718040 CET49917445192.168.2.2275.70.62.251
                                  Mar 19, 2024 13:00:12.924245119 CET49918445192.168.2.2264.131.217.28
                                  Mar 19, 2024 13:00:12.924612045 CET49919445192.168.2.2250.161.20.194
                                  Mar 19, 2024 13:00:12.971326113 CET49920445192.168.2.22183.135.45.82
                                  Mar 19, 2024 13:00:12.986685991 CET49921445192.168.2.22106.128.95.181
                                  Mar 19, 2024 13:00:13.017663956 CET49922445192.168.2.22178.163.116.148
                                  Mar 19, 2024 13:00:13.080184937 CET49923445192.168.2.22142.68.192.178
                                  Mar 19, 2024 13:00:13.204925060 CET49924445192.168.2.22124.77.168.22
                                  Mar 19, 2024 13:00:13.283008099 CET49925445192.168.2.22181.87.171.89
                                  Mar 19, 2024 13:00:13.392371893 CET49926445192.168.2.2257.91.132.16
                                  Mar 19, 2024 13:00:13.392739058 CET49927445192.168.2.22175.46.11.117
                                  Mar 19, 2024 13:00:13.407655001 CET49928445192.168.2.22128.88.221.129
                                  Mar 19, 2024 13:00:13.439152002 CET49929445192.168.2.22121.107.219.89
                                  Mar 19, 2024 13:00:13.501202106 CET49930445192.168.2.22168.236.242.61
                                  Mar 19, 2024 13:00:13.501288891 CET49931445192.168.2.2217.118.0.188
                                  Mar 19, 2024 13:00:13.501296043 CET49932445192.168.2.2219.124.227.36
                                  Mar 19, 2024 13:00:13.501471043 CET49933445192.168.2.22146.15.222.137
                                  Mar 19, 2024 13:00:13.501612902 CET49934445192.168.2.22202.232.133.126
                                  Mar 19, 2024 13:00:13.579313993 CET49935445192.168.2.22119.189.170.27
                                  Mar 19, 2024 13:00:13.579411030 CET49936445192.168.2.22168.49.112.209
                                  Mar 19, 2024 13:00:13.688635111 CET49937445192.168.2.2230.105.213.66
                                  Mar 19, 2024 13:00:13.845000982 CET49938445192.168.2.2258.154.140.71
                                  Mar 19, 2024 13:00:13.860013008 CET49939445192.168.2.2247.90.173.150
                                  Mar 19, 2024 13:00:13.911473036 CET49940445192.168.2.2233.83.51.103
                                  Mar 19, 2024 13:00:13.938153028 CET49941445192.168.2.22189.17.172.53
                                  Mar 19, 2024 13:00:13.938311100 CET49942445192.168.2.2264.33.132.237
                                  Mar 19, 2024 13:00:13.953660011 CET49943445192.168.2.22101.97.15.203
                                  Mar 19, 2024 13:00:14.047311068 CET49944445192.168.2.22196.83.52.9
                                  Mar 19, 2024 13:00:14.047338009 CET49945445192.168.2.22182.175.89.36
                                  Mar 19, 2024 13:00:14.094078064 CET49946445192.168.2.22110.26.166.155
                                  Mar 19, 2024 13:00:14.109899998 CET49947445192.168.2.22199.32.139.77
                                  Mar 19, 2024 13:00:14.141124010 CET49948445192.168.2.22147.177.56.64
                                  Mar 19, 2024 13:00:14.203243017 CET49949445192.168.2.22117.77.126.0
                                  Mar 19, 2024 13:00:14.328298092 CET49950445192.168.2.2286.221.65.237
                                  Mar 19, 2024 13:00:14.406155109 CET49951445192.168.2.22100.115.189.197
                                  Mar 19, 2024 13:00:14.515511990 CET49952445192.168.2.2286.174.193.206
                                  Mar 19, 2024 13:00:14.515650034 CET49953445192.168.2.22112.112.101.108
                                  Mar 19, 2024 13:00:14.515795946 CET49954445192.168.2.22203.119.76.53
                                  Mar 19, 2024 13:00:14.530853033 CET49955445192.168.2.22188.107.91.2
                                  Mar 19, 2024 13:00:14.562048912 CET49956445192.168.2.2246.183.92.6
                                  Mar 19, 2024 13:00:14.624428988 CET49957445192.168.2.2299.190.207.228
                                  Mar 19, 2024 13:00:14.624500990 CET49958445192.168.2.22102.231.220.238
                                  Mar 19, 2024 13:00:14.624660969 CET49959445192.168.2.22167.209.146.183
                                  Mar 19, 2024 13:00:14.624738932 CET49961445192.168.2.22105.224.244.150
                                  Mar 19, 2024 13:00:14.624818087 CET49960445192.168.2.2290.206.241.66
                                  Mar 19, 2024 13:00:14.702605009 CET49962445192.168.2.226.93.67.237
                                  Mar 19, 2024 13:00:14.702646017 CET49963445192.168.2.22121.181.181.204
                                  Mar 19, 2024 13:00:14.812036991 CET49964445192.168.2.22221.152.165.133
                                  Mar 19, 2024 13:00:14.967745066 CET49965445192.168.2.2261.54.68.247
                                  Mar 19, 2024 13:00:14.983575106 CET49966445192.168.2.22163.195.106.64
                                  Mar 19, 2024 13:00:15.030236006 CET49967445192.168.2.2234.237.180.249
                                  Mar 19, 2024 13:00:15.061363935 CET49968445192.168.2.22101.213.66.159
                                  Mar 19, 2024 13:00:15.061527014 CET49969445192.168.2.2269.95.207.41
                                  Mar 19, 2024 13:00:15.077126980 CET49970445192.168.2.22130.38.145.204
                                  Mar 19, 2024 13:00:15.170711040 CET49971445192.168.2.22206.1.225.51
                                  Mar 19, 2024 13:00:15.170782089 CET49972445192.168.2.2252.30.49.140
                                  Mar 19, 2024 13:00:15.217448950 CET49973445192.168.2.22180.161.139.237
                                  Mar 19, 2024 13:00:15.233079910 CET49974445192.168.2.2261.171.13.198
                                  Mar 19, 2024 13:00:15.264477015 CET49975445192.168.2.2233.170.117.111
                                  Mar 19, 2024 13:00:15.326673031 CET49976445192.168.2.22131.85.119.123
                                  Mar 19, 2024 13:00:15.451556921 CET49977445192.168.2.22152.235.16.168
                                  Mar 19, 2024 13:00:15.529457092 CET49978445192.168.2.22210.34.9.152
                                  Mar 19, 2024 13:00:15.529664993 CET49979445192.168.2.2254.191.179.140
                                  Mar 19, 2024 13:00:15.638686895 CET49980445192.168.2.22196.90.219.34
                                  Mar 19, 2024 13:00:15.638791084 CET49981445192.168.2.2249.237.91.104
                                  Mar 19, 2024 13:00:15.638798952 CET49982445192.168.2.2254.89.240.53
                                  Mar 19, 2024 13:00:15.653991938 CET49983445192.168.2.2211.186.11.228
                                  Mar 19, 2024 13:00:15.685484886 CET49984445192.168.2.22207.160.185.179
                                  Mar 19, 2024 13:00:15.747608900 CET49985445192.168.2.22157.100.236.129
                                  Mar 19, 2024 13:00:15.747674942 CET49986445192.168.2.22110.6.252.204
                                  Mar 19, 2024 13:00:15.748331070 CET49987445192.168.2.2277.146.32.152
                                  Mar 19, 2024 13:00:15.748584032 CET49988445192.168.2.22171.17.252.147
                                  Mar 19, 2024 13:00:15.748919964 CET49989445192.168.2.2240.11.59.238
                                  Mar 19, 2024 13:00:15.825558901 CET49990445192.168.2.2271.233.130.239
                                  Mar 19, 2024 13:00:15.825661898 CET49991445192.168.2.22220.30.200.57
                                  Mar 19, 2024 13:00:15.934803009 CET49992445192.168.2.22158.40.209.204
                                  Mar 19, 2024 13:00:16.106528997 CET49993445192.168.2.22208.48.66.48
                                  Mar 19, 2024 13:00:16.106596947 CET49994445192.168.2.22176.124.123.173
                                  Mar 19, 2024 13:00:16.153306007 CET49995445192.168.2.22128.82.204.87
                                  Mar 19, 2024 13:00:16.184627056 CET49996445192.168.2.226.89.158.47
                                  Mar 19, 2024 13:00:16.191751003 CET49997445192.168.2.2271.97.19.6
                                  Mar 19, 2024 13:00:16.200273991 CET49998445192.168.2.2286.162.209.62
                                  Mar 19, 2024 13:00:16.293723106 CET49999445192.168.2.22126.64.63.217
                                  Mar 19, 2024 13:00:16.293911934 CET50000445192.168.2.2290.149.131.142
                                  Mar 19, 2024 13:00:16.340656996 CET50001445192.168.2.2235.32.22.127
                                  Mar 19, 2024 13:00:16.356570959 CET50002445192.168.2.2297.101.233.64
                                  Mar 19, 2024 13:00:16.387389898 CET50003445192.168.2.2211.43.23.171
                                  Mar 19, 2024 13:00:16.449610949 CET50004445192.168.2.22204.124.143.193
                                  Mar 19, 2024 13:00:16.465486050 CET50005445192.168.2.22115.218.172.188
                                  Mar 19, 2024 13:00:16.574562073 CET50006445192.168.2.22173.83.173.82
                                  Mar 19, 2024 13:00:16.582463980 CET4455000090.149.131.142192.168.2.22
                                  Mar 19, 2024 13:00:16.652540922 CET50007445192.168.2.22104.152.90.81
                                  Mar 19, 2024 13:00:16.652606010 CET50008445192.168.2.22199.96.146.93
                                  Mar 19, 2024 13:00:16.761648893 CET50009445192.168.2.22135.196.19.109
                                  Mar 19, 2024 13:00:16.762337923 CET50010445192.168.2.2285.226.160.56
                                  Mar 19, 2024 13:00:16.762715101 CET50011445192.168.2.2293.87.15.208
                                  Mar 19, 2024 13:00:16.777188063 CET50012445192.168.2.2288.150.97.33
                                  Mar 19, 2024 13:00:16.808443069 CET50013445192.168.2.2237.52.184.198
                                  Mar 19, 2024 13:00:16.870786905 CET50014445192.168.2.22141.166.102.166
                                  Mar 19, 2024 13:00:16.870857000 CET50015445192.168.2.22160.27.167.251
                                  Mar 19, 2024 13:00:16.871131897 CET50016445192.168.2.2289.41.150.236
                                  Mar 19, 2024 13:00:16.871370077 CET50017445192.168.2.22171.41.7.225
                                  Mar 19, 2024 13:00:16.871690989 CET50018445192.168.2.22195.30.246.218
                                  Mar 19, 2024 13:00:16.948765039 CET50019445192.168.2.2236.149.133.146
                                  Mar 19, 2024 13:00:16.948841095 CET50020445192.168.2.2243.23.69.97
                                  Mar 19, 2024 13:00:17.058254957 CET50021445192.168.2.22133.79.51.173
                                  Mar 19, 2024 13:00:17.104922056 CET50000445192.168.2.2290.149.131.142
                                  Mar 19, 2024 13:00:17.229691029 CET50022445192.168.2.22148.98.127.231
                                  Mar 19, 2024 13:00:17.229835987 CET50023445192.168.2.22166.116.116.182
                                  Mar 19, 2024 13:00:17.276684999 CET50024445192.168.2.2261.3.109.130
                                  Mar 19, 2024 13:00:17.307948112 CET50025445192.168.2.2258.144.15.207
                                  Mar 19, 2024 13:00:17.307952881 CET50026445192.168.2.2252.156.238.132
                                  Mar 19, 2024 13:00:17.323227882 CET50027445192.168.2.2210.208.152.54
                                  Mar 19, 2024 13:00:17.354646921 CET50028445192.168.2.22121.240.110.84
                                  Mar 19, 2024 13:00:17.392846107 CET4455000090.149.131.142192.168.2.22
                                  Mar 19, 2024 13:00:17.416804075 CET50029445192.168.2.2242.139.62.119
                                  Mar 19, 2024 13:00:17.416966915 CET50030445192.168.2.2235.112.224.155
                                  Mar 19, 2024 13:00:17.463697910 CET50031445192.168.2.22218.118.177.86
                                  Mar 19, 2024 13:00:17.479474068 CET50032445192.168.2.2247.84.202.141
                                  Mar 19, 2024 13:00:17.510593891 CET50033445192.168.2.22144.141.68.86
                                  Mar 19, 2024 13:00:17.572828054 CET50034445192.168.2.2252.228.144.173
                                  Mar 19, 2024 13:00:17.588438988 CET50035445192.168.2.226.72.189.117
                                  Mar 19, 2024 13:00:17.698014021 CET50036445192.168.2.22194.215.104.24
                                  Mar 19, 2024 13:00:17.775772095 CET50037445192.168.2.226.58.239.56
                                  Mar 19, 2024 13:00:17.776087999 CET50038445192.168.2.22214.109.206.173
                                  Mar 19, 2024 13:00:17.884929895 CET50039445192.168.2.22157.219.184.131
                                  Mar 19, 2024 13:00:17.885251045 CET50040445192.168.2.2290.132.165.114
                                  Mar 19, 2024 13:00:17.885636091 CET50041445192.168.2.22163.203.29.193
                                  Mar 19, 2024 13:00:17.900408030 CET50042445192.168.2.22104.112.116.50
                                  Mar 19, 2024 13:00:17.931832075 CET50043445192.168.2.2231.166.234.134
                                  Mar 19, 2024 13:00:17.993985891 CET50044445192.168.2.22147.220.51.249
                                  Mar 19, 2024 13:00:17.994048119 CET50045445192.168.2.22107.57.80.43
                                  Mar 19, 2024 13:00:17.994602919 CET50046445192.168.2.22203.52.89.98
                                  Mar 19, 2024 13:00:17.994942904 CET50047445192.168.2.2258.173.197.164
                                  Mar 19, 2024 13:00:17.995142937 CET50048445192.168.2.22115.228.109.156
                                  Mar 19, 2024 13:00:18.072046041 CET50049445192.168.2.225.71.254.163
                                  Mar 19, 2024 13:00:18.072124958 CET50050445192.168.2.22219.238.17.175
                                  Mar 19, 2024 13:00:18.181504965 CET50051445192.168.2.2269.200.247.65
                                  Mar 19, 2024 13:00:18.181663990 CET50052445192.168.2.2254.120.65.100
                                  Mar 19, 2024 13:00:18.352900982 CET50053445192.168.2.2258.21.17.83
                                  Mar 19, 2024 13:00:18.352969885 CET50054445192.168.2.22108.178.214.41
                                  Mar 19, 2024 13:00:18.399682045 CET50055445192.168.2.2295.8.216.173
                                  Mar 19, 2024 13:00:18.433425903 CET50056445192.168.2.22214.73.44.109
                                  Mar 19, 2024 13:00:18.433530092 CET50057445192.168.2.2250.113.97.195
                                  Mar 19, 2024 13:00:18.446474075 CET50058445192.168.2.224.228.132.145
                                  Mar 19, 2024 13:00:18.477583885 CET50059445192.168.2.22125.237.23.160
                                  Mar 19, 2024 13:00:18.540115118 CET50060445192.168.2.2282.159.46.49
                                  Mar 19, 2024 13:00:18.540201902 CET50061445192.168.2.22203.112.151.160
                                  Mar 19, 2024 13:00:18.586884975 CET50062445192.168.2.2274.48.19.199
                                  Mar 19, 2024 13:00:18.602438927 CET50063445192.168.2.22100.42.20.206
                                  Mar 19, 2024 13:00:18.633598089 CET50064445192.168.2.22220.41.36.67
                                  Mar 19, 2024 13:00:18.696014881 CET50065445192.168.2.22206.58.94.161
                                  Mar 19, 2024 13:00:18.715931892 CET50066445192.168.2.2243.58.219.179
                                  Mar 19, 2024 13:00:18.749269009 CET4455006274.48.19.199192.168.2.22
                                  Mar 19, 2024 13:00:18.821063042 CET50067445192.168.2.2285.74.135.115
                                  Mar 19, 2024 13:00:18.899008036 CET50068445192.168.2.2267.187.26.49
                                  Mar 19, 2024 13:00:18.899077892 CET50069445192.168.2.22144.26.38.145
                                  Mar 19, 2024 13:00:18.946047068 CET50070445192.168.2.22122.31.109.40
                                  Mar 19, 2024 13:00:19.008071899 CET50071445192.168.2.22130.144.95.82
                                  Mar 19, 2024 13:00:19.008362055 CET50072445192.168.2.2281.196.137.227
                                  Mar 19, 2024 13:00:19.008820057 CET50073445192.168.2.2279.118.208.36
                                  Mar 19, 2024 13:00:19.023590088 CET50074445192.168.2.2284.11.70.7
                                  Mar 19, 2024 13:00:19.054852962 CET50075445192.168.2.2224.103.61.201
                                  Mar 19, 2024 13:00:19.117270947 CET50076445192.168.2.2272.135.14.144
                                  Mar 19, 2024 13:00:19.117356062 CET50077445192.168.2.2240.113.67.151
                                  Mar 19, 2024 13:00:19.117357016 CET50078445192.168.2.22203.43.2.205
                                  Mar 19, 2024 13:00:19.117383957 CET50079445192.168.2.22210.109.175.78
                                  Mar 19, 2024 13:00:19.117458105 CET50080445192.168.2.22183.193.108.16
                                  Mar 19, 2024 13:00:19.195369959 CET50081445192.168.2.22129.131.159.126
                                  Mar 19, 2024 13:00:19.195463896 CET50082445192.168.2.2287.202.106.19
                                  Mar 19, 2024 13:00:19.203063011 CET4455007379.118.208.36192.168.2.22
                                  Mar 19, 2024 13:00:19.218050003 CET4455007281.196.137.227192.168.2.22
                                  Mar 19, 2024 13:00:19.257533073 CET50062445192.168.2.2274.48.19.199
                                  Mar 19, 2024 13:00:19.304425955 CET50083445192.168.2.22116.219.185.147
                                  Mar 19, 2024 13:00:19.304826975 CET50084445192.168.2.22201.186.204.171
                                  Mar 19, 2024 13:00:19.416481972 CET4455006274.48.19.199192.168.2.22
                                  Mar 19, 2024 13:00:19.491908073 CET50085445192.168.2.2211.242.67.92
                                  Mar 19, 2024 13:00:19.492289066 CET50086445192.168.2.22154.167.77.119
                                  Mar 19, 2024 13:00:19.523092031 CET50087445192.168.2.22105.187.154.163
                                  Mar 19, 2024 13:00:19.554145098 CET50088445192.168.2.223.80.70.80
                                  Mar 19, 2024 13:00:19.554260969 CET50089445192.168.2.22150.45.247.198
                                  Mar 19, 2024 13:00:19.569731951 CET50090445192.168.2.22191.65.35.144
                                  Mar 19, 2024 13:00:19.600930929 CET50091445192.168.2.22167.180.168.144
                                  Mar 19, 2024 13:00:19.663218975 CET50092445192.168.2.2234.142.89.161
                                  Mar 19, 2024 13:00:19.663439989 CET50093445192.168.2.22123.199.103.154
                                  Mar 19, 2024 13:00:19.710072041 CET50095445192.168.2.22198.178.65.218
                                  Mar 19, 2024 13:00:19.725517988 CET50073445192.168.2.2279.118.208.36
                                  Mar 19, 2024 13:00:19.727938890 CET50072445192.168.2.2281.196.137.227
                                  Mar 19, 2024 13:00:19.731769085 CET50096445192.168.2.22115.239.72.210
                                  Mar 19, 2024 13:00:19.756838083 CET50097445192.168.2.22174.5.98.126
                                  Mar 19, 2024 13:00:19.819220066 CET50098445192.168.2.22138.238.1.70
                                  Mar 19, 2024 13:00:19.834827900 CET50099445192.168.2.22115.231.67.202
                                  Mar 19, 2024 13:00:19.920824051 CET4455007379.118.208.36192.168.2.22
                                  Mar 19, 2024 13:00:19.937808037 CET4455007281.196.137.227192.168.2.22
                                  Mar 19, 2024 13:00:19.944024086 CET50100445192.168.2.22179.86.11.155
                                  Mar 19, 2024 13:00:20.022130966 CET50101445192.168.2.22154.226.222.185
                                  Mar 19, 2024 13:00:20.022197962 CET50102445192.168.2.22192.226.36.235
                                  Mar 19, 2024 13:00:20.068916082 CET50103445192.168.2.22164.81.116.59
                                  Mar 19, 2024 13:00:20.131313086 CET50104445192.168.2.2230.58.250.141
                                  Mar 19, 2024 13:00:20.132018089 CET50105445192.168.2.22206.197.8.29
                                  Mar 19, 2024 13:00:20.132395029 CET50106445192.168.2.22184.157.169.173
                                  Mar 19, 2024 13:00:20.146883965 CET50107445192.168.2.2255.52.236.112
                                  Mar 19, 2024 13:00:20.178040028 CET50108445192.168.2.22219.70.107.151
                                  Mar 19, 2024 13:00:20.240407944 CET50109445192.168.2.22170.37.125.10
                                  Mar 19, 2024 13:00:20.240468979 CET50110445192.168.2.22175.86.231.49
                                  Mar 19, 2024 13:00:20.240544081 CET50111445192.168.2.22119.96.117.238
                                  Mar 19, 2024 13:00:20.240695000 CET50112445192.168.2.22199.168.120.200
                                  Mar 19, 2024 13:00:20.240839958 CET50113445192.168.2.2224.220.63.20
                                  Mar 19, 2024 13:00:20.318532944 CET50114445192.168.2.22140.78.108.154
                                  Mar 19, 2024 13:00:20.318764925 CET50115445192.168.2.22155.205.80.136
                                  Mar 19, 2024 13:00:20.372840881 CET4455011324.220.63.20192.168.2.22
                                  Mar 19, 2024 13:00:20.399698973 CET44550112199.168.120.200192.168.2.22
                                  Mar 19, 2024 13:00:20.427625895 CET50117445192.168.2.2274.225.203.243
                                  Mar 19, 2024 13:00:20.427681923 CET50118445192.168.2.22108.135.38.219
                                  Mar 19, 2024 13:00:20.614984989 CET50119445192.168.2.22176.55.233.163
                                  Mar 19, 2024 13:00:20.615283966 CET50120445192.168.2.22172.28.91.199
                                  Mar 19, 2024 13:00:20.646353006 CET50121445192.168.2.22114.7.107.169
                                  Mar 19, 2024 13:00:20.677280903 CET50122445192.168.2.2281.83.50.155
                                  Mar 19, 2024 13:00:20.677326918 CET50123445192.168.2.22215.45.232.178
                                  Mar 19, 2024 13:00:20.692807913 CET50124445192.168.2.22136.241.197.23
                                  Mar 19, 2024 13:00:20.724021912 CET50125445192.168.2.22170.190.27.40
                                  Mar 19, 2024 13:00:20.786436081 CET50126445192.168.2.2243.22.136.73
                                  Mar 19, 2024 13:00:20.786498070 CET50127445192.168.2.2221.79.156.199
                                  Mar 19, 2024 13:00:20.833220959 CET50129445192.168.2.2250.199.209.42
                                  Mar 19, 2024 13:00:20.848812103 CET50130445192.168.2.22177.202.247.211
                                  Mar 19, 2024 13:00:20.864322901 CET50113445192.168.2.2224.220.63.20
                                  Mar 19, 2024 13:00:20.880054951 CET50131445192.168.2.2251.149.73.188
                                  Mar 19, 2024 13:00:20.895534039 CET50112445192.168.2.22199.168.120.200
                                  Mar 19, 2024 13:00:20.942400932 CET50132445192.168.2.2246.16.225.155
                                  Mar 19, 2024 13:00:20.957984924 CET50133445192.168.2.22135.25.143.106
                                  Mar 19, 2024 13:00:20.996068954 CET4455011324.220.63.20192.168.2.22
                                  Mar 19, 2024 13:00:21.054157972 CET44550112199.168.120.200192.168.2.22
                                  Mar 19, 2024 13:00:21.067199945 CET50135445192.168.2.2256.231.194.168
                                  Mar 19, 2024 13:00:21.147418022 CET50136445192.168.2.22147.108.155.243
                                  Mar 19, 2024 13:00:21.147506952 CET50137445192.168.2.2293.185.247.237
                                  Mar 19, 2024 13:00:21.192071915 CET50138445192.168.2.22140.187.234.251
                                  Mar 19, 2024 13:00:21.254477978 CET50139445192.168.2.22117.193.157.196
                                  Mar 19, 2024 13:00:21.254692078 CET50140445192.168.2.22192.247.56.231
                                  Mar 19, 2024 13:00:21.255089998 CET50141445192.168.2.2249.189.189.237
                                  Mar 19, 2024 13:00:21.270116091 CET50142445192.168.2.2298.140.192.55
                                  Mar 19, 2024 13:00:21.301218033 CET50143445192.168.2.22184.196.136.250
                                  Mar 19, 2024 13:00:21.363616943 CET50144445192.168.2.22140.36.107.72
                                  Mar 19, 2024 13:00:21.363682032 CET50145445192.168.2.22134.21.79.65
                                  Mar 19, 2024 13:00:21.363936901 CET50146445192.168.2.225.110.254.69
                                  Mar 19, 2024 13:00:21.364178896 CET50147445192.168.2.226.77.112.63
                                  Mar 19, 2024 13:00:21.364500046 CET50148445192.168.2.2298.27.83.30
                                  Mar 19, 2024 13:00:21.441627026 CET50149445192.168.2.22110.75.244.243
                                  Mar 19, 2024 13:00:21.441692114 CET50150445192.168.2.2266.188.159.228
                                  Mar 19, 2024 13:00:21.550865889 CET50153445192.168.2.22176.128.218.254
                                  Mar 19, 2024 13:00:21.551069021 CET50154445192.168.2.22115.47.233.106
                                  Mar 19, 2024 13:00:21.738349915 CET50155445192.168.2.22121.199.94.250
                                  Mar 19, 2024 13:00:21.738754988 CET50156445192.168.2.2234.57.69.185
                                  Mar 19, 2024 13:00:21.784640074 CET50157445192.168.2.2213.205.102.110
                                  Mar 19, 2024 13:00:21.800518990 CET50158445192.168.2.2295.7.211.18
                                  Mar 19, 2024 13:00:21.800555944 CET50159445192.168.2.22193.186.231.243
                                  Mar 19, 2024 13:00:21.816078901 CET50160445192.168.2.22180.53.225.50
                                  Mar 19, 2024 13:00:21.847664118 CET50161445192.168.2.2216.71.150.63
                                  Mar 19, 2024 13:00:21.909888029 CET50163445192.168.2.2284.214.164.209
                                  Mar 19, 2024 13:00:21.909981012 CET50164445192.168.2.2299.29.234.125
                                  Mar 19, 2024 13:00:21.956536055 CET50165445192.168.2.22146.31.159.69
                                  Mar 19, 2024 13:00:21.972116947 CET50166445192.168.2.22102.21.121.245
                                  Mar 19, 2024 13:00:22.003351927 CET50167445192.168.2.22168.20.86.80
                                  Mar 19, 2024 13:00:22.065656900 CET50168445192.168.2.22106.185.247.21
                                  Mar 19, 2024 13:00:22.081178904 CET50169445192.168.2.22135.1.186.55
                                  Mar 19, 2024 13:00:22.190546989 CET50172445192.168.2.2283.49.245.121
                                  Mar 19, 2024 13:00:22.268546104 CET50173445192.168.2.22193.117.91.29
                                  Mar 19, 2024 13:00:22.268631935 CET50174445192.168.2.2247.174.193.243
                                  Mar 19, 2024 13:00:22.315234900 CET50175445192.168.2.22135.82.150.58
                                  Mar 19, 2024 13:00:22.377690077 CET50176445192.168.2.22214.58.153.92
                                  Mar 19, 2024 13:00:22.378420115 CET50177445192.168.2.2274.86.45.127
                                  Mar 19, 2024 13:00:22.378773928 CET50178445192.168.2.22195.218.59.84
                                  Mar 19, 2024 13:00:22.393253088 CET50179445192.168.2.22193.93.4.247
                                  Mar 19, 2024 13:00:22.424390078 CET50180445192.168.2.22141.223.209.208
                                  Mar 19, 2024 13:00:22.486861944 CET50181445192.168.2.2250.84.237.128
                                  Mar 19, 2024 13:00:22.486942053 CET50182445192.168.2.2228.84.244.167
                                  Mar 19, 2024 13:00:22.487046003 CET50183445192.168.2.2218.65.42.28
                                  Mar 19, 2024 13:00:22.487076044 CET50184445192.168.2.22154.54.86.11
                                  Mar 19, 2024 13:00:22.502428055 CET50185445192.168.2.22205.50.184.80
                                  Mar 19, 2024 13:00:22.565248966 CET50186445192.168.2.224.246.109.13
                                  Mar 19, 2024 13:00:22.565488100 CET50187445192.168.2.2277.152.71.131
                                  Mar 19, 2024 13:00:22.674010038 CET50191445192.168.2.22142.65.170.59
                                  Mar 19, 2024 13:00:22.674381018 CET50192445192.168.2.22197.81.32.168
                                  Mar 19, 2024 13:00:22.861263990 CET50193445192.168.2.22160.163.85.69
                                  Mar 19, 2024 13:00:22.861390114 CET50194445192.168.2.22208.60.175.26
                                  Mar 19, 2024 13:00:22.892457008 CET50195445192.168.2.2222.111.196.15
                                  Mar 19, 2024 13:00:22.923682928 CET50196445192.168.2.2265.44.46.212
                                  Mar 19, 2024 13:00:22.923815966 CET50197445192.168.2.2224.176.87.199
                                  Mar 19, 2024 13:00:22.939574957 CET50198445192.168.2.22158.20.53.32
                                  Mar 19, 2024 13:00:22.970771074 CET50199445192.168.2.22142.183.72.246
                                  Mar 19, 2024 13:00:23.032809973 CET50200445192.168.2.22109.168.93.89
                                  Mar 19, 2024 13:00:23.033480883 CET50202445192.168.2.22108.78.158.25
                                  Mar 19, 2024 13:00:23.095216990 CET50205445192.168.2.22113.162.26.61
                                  Mar 19, 2024 13:00:23.126446009 CET50206445192.168.2.22141.43.125.82
                                  Mar 19, 2024 13:00:23.189040899 CET50207445192.168.2.22191.212.127.159
                                  Mar 19, 2024 13:00:23.204444885 CET50208445192.168.2.22143.202.90.161
                                  Mar 19, 2024 13:00:23.313630104 CET50211445192.168.2.2210.125.245.135
                                  Mar 19, 2024 13:00:23.391818047 CET50212445192.168.2.22146.159.223.22
                                  Mar 19, 2024 13:00:23.391849995 CET50213445192.168.2.2218.155.205.32
                                  Mar 19, 2024 13:00:23.438467979 CET50214445192.168.2.22103.232.169.229
                                  Mar 19, 2024 13:00:23.500889063 CET50215445192.168.2.22205.202.243.57
                                  Mar 19, 2024 13:00:23.501127958 CET50216445192.168.2.22140.183.220.154
                                  Mar 19, 2024 13:00:23.501235962 CET50217445192.168.2.22126.168.254.181
                                  Mar 19, 2024 13:00:23.516462088 CET50218445192.168.2.22164.235.221.114
                                  Mar 19, 2024 13:00:23.547653913 CET50220445192.168.2.2241.38.198.60
                                  Mar 19, 2024 13:00:23.610140085 CET50221445192.168.2.22173.34.110.125
                                  Mar 19, 2024 13:00:23.610141993 CET50222445192.168.2.22166.72.60.208
                                  Mar 19, 2024 13:00:23.610203028 CET50223445192.168.2.2223.232.162.154
                                  Mar 19, 2024 13:00:23.610629082 CET50224445192.168.2.2290.188.69.100
                                  Mar 19, 2024 13:00:23.625715017 CET50225445192.168.2.2294.162.67.171
                                  Mar 19, 2024 13:00:23.688097000 CET50226445192.168.2.22108.49.81.23
                                  Mar 19, 2024 13:00:23.688168049 CET50227445192.168.2.2211.52.174.14
                                  Mar 19, 2024 13:00:23.797211885 CET50231445192.168.2.2255.254.104.110
                                  Mar 19, 2024 13:00:23.797568083 CET50232445192.168.2.2259.106.164.161
                                  Mar 19, 2024 13:00:23.984519005 CET50234445192.168.2.2259.42.237.147
                                  Mar 19, 2024 13:00:23.984877110 CET50235445192.168.2.2256.82.11.117
                                  Mar 19, 2024 13:00:24.015837908 CET50236445192.168.2.22122.203.113.90
                                  Mar 19, 2024 13:00:24.047019005 CET50237445192.168.2.22141.0.57.115
                                  Mar 19, 2024 13:00:24.047148943 CET50238445192.168.2.2284.89.111.38
                                  Mar 19, 2024 13:00:24.062452078 CET50239445192.168.2.22155.132.147.24
                                  Mar 19, 2024 13:00:24.093889952 CET50240445192.168.2.2254.138.140.2
                                  Mar 19, 2024 13:00:24.156472921 CET50242445192.168.2.2294.167.213.128
                                  Mar 19, 2024 13:00:24.156687021 CET50241445192.168.2.22163.219.58.47
                                  Mar 19, 2024 13:00:24.206531048 CET50244445192.168.2.22122.111.73.2
                                  Mar 19, 2024 13:00:24.218772888 CET50246445192.168.2.22161.192.15.145
                                  Mar 19, 2024 13:00:24.249831915 CET50247445192.168.2.2273.11.244.39
                                  Mar 19, 2024 13:00:24.312155008 CET50248445192.168.2.2285.170.60.0
                                  Mar 19, 2024 13:00:24.327734947 CET50249445192.168.2.2243.202.230.41
                                  Mar 19, 2024 13:00:24.437365055 CET50253445192.168.2.22164.140.124.179
                                  Mar 19, 2024 13:00:24.515547037 CET50254445192.168.2.2275.157.166.191
                                  Mar 19, 2024 13:00:24.515769958 CET50255445192.168.2.2257.141.138.238
                                  Mar 19, 2024 13:00:24.561687946 CET50256445192.168.2.22151.28.169.3
                                  Mar 19, 2024 13:00:24.624526978 CET50257445192.168.2.22178.202.228.86
                                  Mar 19, 2024 13:00:24.624737024 CET50258445192.168.2.22109.215.136.14
                                  Mar 19, 2024 13:00:24.625077009 CET50259445192.168.2.22104.77.46.103
                                  Mar 19, 2024 13:00:24.639991045 CET50260445192.168.2.22167.4.105.94
                                  Mar 19, 2024 13:00:24.733546972 CET50264445192.168.2.229.63.170.82
                                  Mar 19, 2024 13:00:24.733818054 CET50266445192.168.2.2225.132.30.168
                                  Mar 19, 2024 13:00:24.733891964 CET50265445192.168.2.2296.175.132.232
                                  Mar 19, 2024 13:00:24.734097958 CET50267445192.168.2.22203.148.116.42
                                  Mar 19, 2024 13:00:24.749461889 CET50268445192.168.2.2292.197.190.211
                                  Mar 19, 2024 13:00:24.754686117 CET44550256151.28.169.3192.168.2.22
                                  Mar 19, 2024 13:00:24.811285019 CET50269445192.168.2.22140.180.66.176
                                  Mar 19, 2024 13:00:24.811391115 CET50270445192.168.2.22148.64.200.59
                                  Mar 19, 2024 13:00:24.920460939 CET50274445192.168.2.2296.55.221.207
                                  Mar 19, 2024 13:00:24.925529957 CET50275445192.168.2.2277.96.90.223
                                  Mar 19, 2024 13:00:25.108764887 CET50278445192.168.2.22125.45.204.69
                                  Mar 19, 2024 13:00:25.108822107 CET50279445192.168.2.2266.82.202.0
                                  Mar 19, 2024 13:00:25.147875071 CET50280445192.168.2.22182.90.160.59
                                  Mar 19, 2024 13:00:25.170236111 CET50281445192.168.2.22209.103.29.87
                                  Mar 19, 2024 13:00:25.170377970 CET50282445192.168.2.22211.203.36.107
                                  Mar 19, 2024 13:00:25.191801071 CET50283445192.168.2.22175.26.160.231
                                  Mar 19, 2024 13:00:25.222274065 CET50284445192.168.2.229.144.61.137
                                  Mar 19, 2024 13:00:25.279483080 CET50286445192.168.2.22214.67.216.109
                                  Mar 19, 2024 13:00:25.279596090 CET50287445192.168.2.22201.133.125.19
                                  Mar 19, 2024 13:00:25.325928926 CET50256445192.168.2.22151.28.169.3
                                  Mar 19, 2024 13:00:25.326086044 CET50288445192.168.2.22152.165.22.28
                                  Mar 19, 2024 13:00:25.344865084 CET50290445192.168.2.22210.42.213.185
                                  Mar 19, 2024 13:00:25.373266935 CET50292445192.168.2.2240.195.67.143
                                  Mar 19, 2024 13:00:25.435237885 CET50293445192.168.2.2249.35.128.117
                                  Mar 19, 2024 13:00:25.450828075 CET50294445192.168.2.2224.205.71.79
                                  Mar 19, 2024 13:00:25.517750978 CET44550256151.28.169.3192.168.2.22
                                  Mar 19, 2024 13:00:25.564254045 CET50298445192.168.2.2275.37.119.78
                                  Mar 19, 2024 13:00:25.605274916 CET44550288152.165.22.28192.168.2.22
                                  Mar 19, 2024 13:00:25.638196945 CET50299445192.168.2.22133.138.81.159
                                  Mar 19, 2024 13:00:25.638283014 CET50300445192.168.2.22178.218.81.120
                                  Mar 19, 2024 13:00:25.684844971 CET50302445192.168.2.22177.210.174.244
                                  Mar 19, 2024 13:00:25.747479916 CET50303445192.168.2.2276.146.219.219
                                  Mar 19, 2024 13:00:25.747633934 CET50304445192.168.2.22110.113.53.18
                                  Mar 19, 2024 13:00:25.747807026 CET50305445192.168.2.2247.161.240.240
                                  Mar 19, 2024 13:00:25.762850046 CET50306445192.168.2.22209.23.249.224
                                  Mar 19, 2024 13:00:25.794852972 CET50308445192.168.2.22110.15.211.240
                                  Mar 19, 2024 13:00:25.856451035 CET50310445192.168.2.2224.144.46.99
                                  Mar 19, 2024 13:00:25.856471062 CET50311445192.168.2.22115.241.215.84
                                  Mar 19, 2024 13:00:25.856547117 CET50312445192.168.2.2230.39.168.11
                                  Mar 19, 2024 13:00:25.856616020 CET50313445192.168.2.22159.205.199.159
                                  Mar 19, 2024 13:00:25.872237921 CET50314445192.168.2.22157.107.226.35
                                  Mar 19, 2024 13:00:25.934525967 CET50315445192.168.2.22221.58.74.177
                                  Mar 19, 2024 13:00:25.934619904 CET50316445192.168.2.22139.243.59.116
                                  Mar 19, 2024 13:00:26.043632984 CET50321445192.168.2.22222.125.28.112
                                  Mar 19, 2024 13:00:26.043920994 CET50322445192.168.2.2242.142.148.141
                                  Mar 19, 2024 13:00:26.121527910 CET50288445192.168.2.22152.165.22.28
                                  Mar 19, 2024 13:00:26.231122971 CET50326445192.168.2.22152.148.56.120
                                  Mar 19, 2024 13:00:26.231205940 CET50327445192.168.2.22152.42.63.251
                                  Mar 19, 2024 13:00:26.262038946 CET50328445192.168.2.22154.49.193.47
                                  Mar 19, 2024 13:00:26.293286085 CET50329445192.168.2.2298.149.152.13
                                  Mar 19, 2024 13:00:26.293313026 CET50330445192.168.2.22181.29.116.116
                                  Mar 19, 2024 13:00:26.309024096 CET50331445192.168.2.2288.217.41.203
                                  Mar 19, 2024 13:00:26.340156078 CET50332445192.168.2.2236.151.190.102
                                  Mar 19, 2024 13:00:26.401770115 CET44550288152.165.22.28192.168.2.22
                                  Mar 19, 2024 13:00:26.402465105 CET50333445192.168.2.22167.27.147.216
                                  Mar 19, 2024 13:00:26.402626038 CET50335445192.168.2.22211.211.11.34
                                  Mar 19, 2024 13:00:26.449300051 CET50336445192.168.2.22218.31.187.159
                                  Mar 19, 2024 13:00:26.464844942 CET50339445192.168.2.22211.211.241.225
                                  Mar 19, 2024 13:00:26.495985985 CET50341445192.168.2.22138.246.217.105
                                  Mar 19, 2024 13:00:26.558499098 CET50342445192.168.2.22192.106.78.117
                                  Mar 19, 2024 13:00:26.574115038 CET50343445192.168.2.22132.254.99.45
                                  Mar 19, 2024 13:00:26.683324099 CET50347445192.168.2.2213.214.240.95
                                  Mar 19, 2024 13:00:26.761326075 CET50349445192.168.2.22219.177.136.19
                                  Mar 19, 2024 13:00:26.761385918 CET50350445192.168.2.2248.21.174.59
                                  Mar 19, 2024 13:00:26.808046103 CET50352445192.168.2.222.105.142.208
                                  Mar 19, 2024 13:00:26.870589972 CET50353445192.168.2.2244.15.43.94
                                  Mar 19, 2024 13:00:26.870719910 CET50354445192.168.2.22174.64.243.114
                                  Mar 19, 2024 13:00:26.870757103 CET50355445192.168.2.22105.69.49.143
                                  Mar 19, 2024 13:00:26.886023998 CET50356445192.168.2.2267.56.107.68
                                  Mar 19, 2024 13:00:26.917298079 CET50359445192.168.2.22115.70.18.211
                                  Mar 19, 2024 13:00:26.979681015 CET50361445192.168.2.22101.111.17.226
                                  Mar 19, 2024 13:00:26.979757071 CET50362445192.168.2.22205.37.141.98
                                  Mar 19, 2024 13:00:26.979799032 CET50363445192.168.2.2251.244.235.31
                                  Mar 19, 2024 13:00:26.979839087 CET50364445192.168.2.22162.174.20.104
                                  Mar 19, 2024 13:00:26.995254993 CET50365445192.168.2.22192.123.103.148
                                  Mar 19, 2024 13:00:27.057661057 CET50366445192.168.2.22193.41.33.63
                                  Mar 19, 2024 13:00:27.057737112 CET50367445192.168.2.22159.234.64.150
                                  Mar 19, 2024 13:00:27.166834116 CET50373445192.168.2.22129.80.239.22
                                  Mar 19, 2024 13:00:27.166857958 CET50374445192.168.2.2257.99.198.43
                                  Mar 19, 2024 13:00:27.354298115 CET50379445192.168.2.22220.148.16.176
                                  Mar 19, 2024 13:00:27.354361057 CET50380445192.168.2.22175.223.241.199
                                  Mar 19, 2024 13:00:27.422395945 CET50381445192.168.2.2218.13.160.153
                                  Mar 19, 2024 13:00:27.431981087 CET50382445192.168.2.22176.87.141.234
                                  Mar 19, 2024 13:00:27.433760881 CET50383445192.168.2.2219.124.93.203
                                  Mar 19, 2024 13:00:27.433892965 CET50384445192.168.2.2263.1.216.84
                                  Mar 19, 2024 13:00:27.463298082 CET50385445192.168.2.22223.82.58.120
                                  Mar 19, 2024 13:00:27.588108063 CET50387445192.168.2.2274.221.139.85
                                  Mar 19, 2024 13:00:27.625379086 CET50388445192.168.2.22152.63.199.165
                                  Mar 19, 2024 13:00:27.626080990 CET50389445192.168.2.22176.104.249.16
                                  Mar 19, 2024 13:00:27.626277924 CET50391445192.168.2.2246.94.136.47
                                  Mar 19, 2024 13:00:27.972405910 CET50396445192.168.2.22161.211.55.73
                                  Mar 19, 2024 13:00:27.972537994 CET50398445192.168.2.2238.144.11.67
                                  Mar 19, 2024 13:00:27.972670078 CET50401445192.168.2.2287.131.77.235
                                  Mar 19, 2024 13:00:27.976320028 CET50403445192.168.2.22114.119.213.7
                                  Mar 19, 2024 13:00:28.071811914 CET50405445192.168.2.2243.10.21.120
                                  Mar 19, 2024 13:00:28.071885109 CET50406445192.168.2.22174.145.206.164
                                  Mar 19, 2024 13:00:28.071963072 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:00:28.072060108 CET50410445192.168.2.22188.178.112.15
                                  Mar 19, 2024 13:00:28.072278023 CET50413445192.168.2.22125.83.101.170
                                  Mar 19, 2024 13:00:28.072331905 CET50414445192.168.2.22152.38.166.139
                                  Mar 19, 2024 13:00:28.087266922 CET50415445192.168.2.22131.234.70.159
                                  Mar 19, 2024 13:00:28.087353945 CET50416445192.168.2.22178.2.244.48
                                  Mar 19, 2024 13:00:28.102961063 CET50417445192.168.2.22112.77.50.39
                                  Mar 19, 2024 13:00:28.103005886 CET50418445192.168.2.2284.242.178.131
                                  Mar 19, 2024 13:00:28.103054047 CET50419445192.168.2.2251.70.40.117
                                  Mar 19, 2024 13:00:28.103101969 CET50420445192.168.2.2255.36.108.250
                                  Mar 19, 2024 13:00:28.118424892 CET50422445192.168.2.22220.77.103.18
                                  Mar 19, 2024 13:00:28.329832077 CET445504085.209.64.109192.168.2.22
                                  Mar 19, 2024 13:00:28.329907894 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:00:28.386318922 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:00:28.386404991 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:28.386605978 CET50429445192.168.2.2261.49.91.181
                                  Mar 19, 2024 13:00:28.447774887 CET50431445192.168.2.2217.62.61.173
                                  Mar 19, 2024 13:00:28.447844028 CET50432445192.168.2.22167.203.175.140
                                  Mar 19, 2024 13:00:28.537437916 CET50436445192.168.2.22214.29.115.68
                                  Mar 19, 2024 13:00:28.537550926 CET50437445192.168.2.22211.218.132.242
                                  Mar 19, 2024 13:00:28.539632082 CET50439445192.168.2.22181.217.208.27
                                  Mar 19, 2024 13:00:28.555232048 CET50440445192.168.2.22194.39.227.240
                                  Mar 19, 2024 13:00:28.555555105 CET50441445192.168.2.22137.193.148.143
                                  Mar 19, 2024 13:00:28.555696964 CET50442445192.168.2.2285.212.254.179
                                  Mar 19, 2024 13:00:28.556091070 CET50445445192.168.2.2218.188.130.253
                                  Mar 19, 2024 13:00:28.586456060 CET50447445192.168.2.2240.107.10.188
                                  Mar 19, 2024 13:00:28.633141041 CET445504275.209.64.1192.168.2.22
                                  Mar 19, 2024 13:00:28.633205891 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:28.633327961 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:28.633517027 CET50448445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:28.711239100 CET50450445192.168.2.22120.114.18.216
                                  Mar 19, 2024 13:00:28.742607117 CET50452445192.168.2.227.217.145.17
                                  Mar 19, 2024 13:00:28.742608070 CET50453445192.168.2.22159.119.148.78
                                  Mar 19, 2024 13:00:28.742727995 CET50455445192.168.2.22199.253.145.237
                                  Mar 19, 2024 13:00:28.891783953 CET445504485.209.64.1192.168.2.22
                                  Mar 19, 2024 13:00:28.891855955 CET50448445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:28.891891003 CET50448445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:29.085948944 CET50462445192.168.2.2297.135.89.245
                                  Mar 19, 2024 13:00:29.086062908 CET50466445192.168.2.22103.102.125.187
                                  Mar 19, 2024 13:00:29.086132050 CET50468445192.168.2.2245.157.240.74
                                  Mar 19, 2024 13:00:29.086225033 CET50471445192.168.2.22181.226.57.41
                                  Mar 19, 2024 13:00:29.163546085 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:00:29.194823027 CET50474445192.168.2.22168.161.136.12
                                  Mar 19, 2024 13:00:29.194972992 CET50479445192.168.2.2286.202.153.140
                                  Mar 19, 2024 13:00:29.195023060 CET50480445192.168.2.2223.172.213.144
                                  Mar 19, 2024 13:00:29.195040941 CET50481445192.168.2.22104.26.173.67
                                  Mar 19, 2024 13:00:29.195106983 CET50482445192.168.2.2265.182.187.235
                                  Mar 19, 2024 13:00:29.210484982 CET50483445192.168.2.22217.86.165.3
                                  Mar 19, 2024 13:00:29.210550070 CET50484445192.168.2.2224.47.43.76
                                  Mar 19, 2024 13:00:29.226022959 CET50485445192.168.2.22109.44.233.43
                                  Mar 19, 2024 13:00:29.226048946 CET50486445192.168.2.22141.110.208.172
                                  Mar 19, 2024 13:00:29.226125002 CET50487445192.168.2.2267.149.136.221
                                  Mar 19, 2024 13:00:29.226129055 CET50488445192.168.2.2240.244.54.136
                                  Mar 19, 2024 13:00:29.241771936 CET50490445192.168.2.2227.87.72.94
                                  Mar 19, 2024 13:00:29.351682901 CET44550471181.226.57.41192.168.2.22
                                  Mar 19, 2024 13:00:29.397547960 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:29.418198109 CET44550483217.86.165.3192.168.2.22
                                  Mar 19, 2024 13:00:29.506875038 CET50501445192.168.2.2284.251.48.96
                                  Mar 19, 2024 13:00:29.569657087 CET50504445192.168.2.2266.96.158.211
                                  Mar 19, 2024 13:00:29.569719076 CET50505445192.168.2.22147.214.219.82
                                  Mar 19, 2024 13:00:29.647146940 CET50448445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:29.647399902 CET50511445192.168.2.22179.243.231.245
                                  Mar 19, 2024 13:00:29.647501945 CET50513445192.168.2.22185.21.203.29
                                  Mar 19, 2024 13:00:29.662842035 CET50514445192.168.2.2271.150.1.14
                                  Mar 19, 2024 13:00:29.678433895 CET50515445192.168.2.2273.107.70.97
                                  Mar 19, 2024 13:00:29.678563118 CET50516445192.168.2.22165.89.226.233
                                  Mar 19, 2024 13:00:29.678596020 CET50517445192.168.2.2223.174.125.232
                                  Mar 19, 2024 13:00:29.678699017 CET50520445192.168.2.2212.141.108.176
                                  Mar 19, 2024 13:00:29.696506023 CET4455050184.251.48.96192.168.2.22
                                  Mar 19, 2024 13:00:29.709893942 CET50523445192.168.2.2275.100.136.2
                                  Mar 19, 2024 13:00:29.834449053 CET50528445192.168.2.22196.37.137.56
                                  Mar 19, 2024 13:00:29.850055933 CET50471445192.168.2.22181.226.57.41
                                  Mar 19, 2024 13:00:29.865704060 CET50530445192.168.2.2276.201.108.57
                                  Mar 19, 2024 13:00:29.865892887 CET50532445192.168.2.22117.221.222.120
                                  Mar 19, 2024 13:00:29.865940094 CET50534445192.168.2.221.170.254.212
                                  Mar 19, 2024 13:00:29.927937984 CET50483445192.168.2.22217.86.165.3
                                  Mar 19, 2024 13:00:30.119142056 CET44550471181.226.57.41192.168.2.22
                                  Mar 19, 2024 13:00:30.135710955 CET44550483217.86.165.3192.168.2.22
                                  Mar 19, 2024 13:00:30.208781958 CET50501445192.168.2.2284.251.48.96
                                  Mar 19, 2024 13:00:30.209193945 CET50557445192.168.2.2254.122.35.122
                                  Mar 19, 2024 13:00:30.209248066 CET50559445192.168.2.2293.116.86.104
                                  Mar 19, 2024 13:00:30.209388018 CET50563445192.168.2.225.202.243.83
                                  Mar 19, 2024 13:00:30.209443092 CET50565445192.168.2.22172.144.35.42
                                  Mar 19, 2024 13:00:30.318185091 CET50579445192.168.2.22113.25.247.88
                                  Mar 19, 2024 13:00:30.318188906 CET50577445192.168.2.2260.63.47.193
                                  Mar 19, 2024 13:00:30.318188906 CET50578445192.168.2.2210.200.112.8
                                  Mar 19, 2024 13:00:30.318231106 CET50582445192.168.2.2251.183.183.107
                                  Mar 19, 2024 13:00:30.318253994 CET50583445192.168.2.2229.104.94.101
                                  Mar 19, 2024 13:00:30.333645105 CET50585445192.168.2.22106.159.23.200
                                  Mar 19, 2024 13:00:30.333857059 CET50586445192.168.2.22197.250.99.109
                                  Mar 19, 2024 13:00:30.349248886 CET50588445192.168.2.22194.31.220.0
                                  Mar 19, 2024 13:00:30.349309921 CET50589445192.168.2.2251.197.132.180
                                  Mar 19, 2024 13:00:30.349507093 CET50591445192.168.2.2298.134.15.119
                                  Mar 19, 2024 13:00:30.349709988 CET50592445192.168.2.22137.43.130.10
                                  Mar 19, 2024 13:00:30.365037918 CET50595445192.168.2.2265.88.116.47
                                  Mar 19, 2024 13:00:30.397339106 CET4455050184.251.48.96192.168.2.22
                                  Mar 19, 2024 13:00:30.630312920 CET50621445192.168.2.2244.64.96.118
                                  Mar 19, 2024 13:00:30.692789078 CET50630445192.168.2.225.152.235.208
                                  Mar 19, 2024 13:00:30.692878008 CET50631445192.168.2.2232.251.230.102
                                  Mar 19, 2024 13:00:30.739160061 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:00:30.770462990 CET50637445192.168.2.22165.177.37.181
                                  Mar 19, 2024 13:00:30.770601034 CET50639445192.168.2.22190.233.92.248
                                  Mar 19, 2024 13:00:30.786011934 CET50641445192.168.2.22106.32.185.51
                                  Mar 19, 2024 13:00:30.801744938 CET50644445192.168.2.2254.236.245.42
                                  Mar 19, 2024 13:00:30.801748037 CET50643445192.168.2.22178.208.225.176
                                  Mar 19, 2024 13:00:30.801906109 CET50648445192.168.2.2260.208.46.124
                                  Mar 19, 2024 13:00:30.801948071 CET50647445192.168.2.22205.220.147.116
                                  Mar 19, 2024 13:00:30.907692909 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:31.160350084 CET50448445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:31.468321085 CET50448445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:33.859168053 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:00:33.921564102 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:39.927557945 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:40.114779949 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:00:51.924021959 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:00:52.610409021 CET50408445192.168.2.225.209.64.109
                                  Mar 19, 2024 13:01:15.932499886 CET50427445192.168.2.225.209.64.1
                                  Mar 19, 2024 13:01:17.570558071 CET50408445192.168.2.225.209.64.109
                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 19, 2024 12:59:22.162600040 CET138138192.168.2.22192.168.2.255
                                  Mar 19, 2024 12:59:26.329581976 CET138138192.168.2.22192.168.2.255
                                  Mar 19, 2024 12:59:26.506947994 CET5456253192.168.2.228.8.8.8
                                  Mar 19, 2024 12:59:26.606369972 CET53545628.8.8.8192.168.2.22
                                  Mar 19, 2024 12:59:26.963275909 CET5291753192.168.2.228.8.8.8
                                  Mar 19, 2024 12:59:27.060370922 CET53529178.8.8.8192.168.2.22
                                  Mar 19, 2024 13:01:26.031538010 CET138138192.168.2.22192.168.2.255
                                  TimestampSource IPDest IPChecksumCodeType
                                  Mar 19, 2024 12:59:30.956001043 CET211.233.26.186192.168.2.22c7d3(Time to live exceeded in transit)Time Exceeded
                                  Mar 19, 2024 12:59:49.146991014 CET77.187.137.217192.168.2.22356e(Unknown)Destination Unreachable
                                  Mar 19, 2024 12:59:59.910646915 CET78.136.135.10192.168.2.22cd8b(Time to live exceeded in transit)Time Exceeded
                                  Mar 19, 2024 12:59:59.936063051 CET151.14.48.6192.168.2.22891c(Host unreachable)Destination Unreachable
                                  Mar 19, 2024 13:00:01.619266033 CET40.128.251.121192.168.2.2211a3(Host unreachable)Destination Unreachable
                                  Mar 19, 2024 13:00:05.725773096 CET88.116.56.50192.168.2.225086(Port unreachable)Destination Unreachable
                                  Mar 19, 2024 13:00:06.834146023 CET38.140.246.249192.168.2.225f13(Net unreachable)Destination Unreachable
                                  Mar 19, 2024 13:00:08.688941002 CET77.191.157.219192.168.2.227679(Unknown)Destination Unreachable
                                  Mar 19, 2024 13:00:11.874273062 CET185.161.75.21192.168.2.22c48e(Unknown)Destination Unreachable
                                  Mar 19, 2024 13:00:14.449457884 CET183.178.25.252192.168.2.22a28b(Host unreachable)Destination Unreachable
                                  Mar 19, 2024 13:00:17.046430111 CET185.54.120.139192.168.2.2279d1(Unknown)Destination Unreachable
                                  Mar 19, 2024 13:00:21.982461929 CET62.218.129.38192.168.2.227a8b(Host unreachable)Destination Unreachable
                                  Mar 19, 2024 13:00:23.225405931 CET109.168.93.89192.168.2.2246d5(Unknown)Destination Unreachable
                                  Mar 19, 2024 13:00:26.494009972 CET88.217.41.203192.168.2.22f3d9(Unknown)Destination Unreachable
                                  Mar 19, 2024 13:00:27.836168051 CET45.14.111.171192.168.2.22695e(Net unreachable)Destination Unreachable
                                  Mar 19, 2024 13:00:30.889715910 CET5.152.235.6192.168.2.224d8a(Time to live exceeded in transit)Time Exceeded
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Mar 19, 2024 12:59:26.506947994 CET192.168.2.228.8.8.80x7db7Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                  Mar 19, 2024 12:59:26.963275909 CET192.168.2.228.8.8.80x8111Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Mar 19, 2024 12:59:26.606369972 CET8.8.8.8192.168.2.220x7db7No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.17.244.81A (IP address)IN (0x0001)false
                                  Mar 19, 2024 12:59:26.606369972 CET8.8.8.8192.168.2.220x7db7No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.173.80A (IP address)IN (0x0001)false
                                  Mar 19, 2024 12:59:27.060370922 CET8.8.8.8192.168.2.220x8111No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.17.244.81A (IP address)IN (0x0001)false
                                  Mar 19, 2024 12:59:27.060370922 CET8.8.8.8192.168.2.220x8111No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.173.80A (IP address)IN (0x0001)false
                                  • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.2249161104.17.244.81802680C:\Users\user\Desktop\qCc1a4w5YZ.exe
                                  TimestampBytes transferredDirectionData
                                  Mar 19, 2024 12:59:26.731565952 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Mar 19, 2024 12:59:26.837632895 CET778INHTTP/1.1 200 OK
                                  Date: Tue, 19 Mar 2024 11:59:26 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 866d4be05d6b5e86-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.2249162104.17.244.81803164C:\Users\user\Desktop\qCc1a4w5YZ.exe
                                  TimestampBytes transferredDirectionData
                                  Mar 19, 2024 12:59:27.165393114 CET100OUTGET / HTTP/1.1
                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  Cache-Control: no-cache
                                  Mar 19, 2024 12:59:27.283140898 CET778INHTTP/1.1 200 OK
                                  Date: Tue, 19 Mar 2024 11:59:27 GMT
                                  Content-Type: text/html
                                  Content-Length: 607
                                  Connection: close
                                  Server: cloudflare
                                  CF-RAY: 866d4be30cbc0f83-EWR
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                  Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:12:59:23
                                  Start date:19/03/2024
                                  Path:C:\Users\user\Desktop\qCc1a4w5YZ.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\qCc1a4w5YZ.exe"
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:FB1C4D59ADAF64A044DBA323EA8FE6F0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000000.00000000.335185624.000000000040F000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000000.00000000.335206533.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000000.00000000.335206533.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:12:59:25
                                  Start date:19/03/2024
                                  Path:C:\Users\user\Desktop\qCc1a4w5YZ.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\qCc1a4w5YZ.exe -m security
                                  Imagebase:0x400000
                                  File size:3'723'264 bytes
                                  MD5 hash:FB1C4D59ADAF64A044DBA323EA8FE6F0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000000.338908311.000000000040F000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000000.338930451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000004.00000000.338930451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000002.476299865.000000000280B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000004.00000002.476299865.000000000280B000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000002.476242619.00000000022F3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000004.00000002.476242619.00000000022F3000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:12:59:26
                                  Start date:19/03/2024
                                  Path:C:\Windows\tasksche.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\WINDOWS\tasksche.exe /i
                                  Imagebase:0x400000
                                  File size:3'514'368 bytes
                                  MD5 hash:7F7CCAA16FB15EB1C7399D422F8363E8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.340346288.000000000040E000.00000008.00000001.01000000.00000005.sdmp, Author: us-cert code analysis team
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmp, Author: us-cert code analysis team
                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                  • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 97%, ReversingLabs
                                  • Detection: 93%, Virustotal, Browse
                                  Reputation:moderate
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:82.1%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:64.9%
                                    Total number of Nodes:37
                                    Total number of Limit Nodes:2

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,76A05360,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA,?,00000000), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA,?,00000000), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile,?,00000000), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle,?,00000000), ref: 00407D34
                                    • FindResourceA.KERNEL32 ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32 ref: 00407E2C
                                    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00407E61
                                    • CloseHandle.KERNEL32(00000000), ref: 00407E68
                                    • CreateProcessA.KERNEL32 ref: 00407EE8
                                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.341932452.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.341929359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341936408.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341948668.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4281112323-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.SECHOST(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,76A05360,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.341932452.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.341929359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341936408.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341948668.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                    • API String ID: 3340711343-4063779371
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.341932452.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.341929359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341936408.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341948668.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: 372b72291a79fe7f323a7fd117d835006d69336e2c0488ca977e4fa79056e622
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: 372b72291a79fe7f323a7fd117d835006d69336e2c0488ca977e4fa79056e622
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.341932452.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.341929359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341936408.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341948668.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    • API String ID: 774561529-2942426231
                                    • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                    • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                    • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                    • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,76A05360,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.341932452.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.341929359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341936408.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341939628.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341948668.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.341968463.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.0
                                    • API String ID: 4274534310-3729025388
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:36.4%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:35
                                    Total number of Limit Nodes:2

                                    Callgraph

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • __p___argc.MSVCRT ref: 004080A5
                                    • OpenSCManagerA.SECHOST(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,76A05360,00000000,?,004081B2), ref: 004080DC
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.476065209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000004.00000002.476062418.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476068199.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476080919.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476084079.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                    • String ID: mssecsvc2.0
                                    • API String ID: 4274534310-3729025388
                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.476065209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000004.00000002.476062418.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476068199.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476080919.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476084079.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                    • String ID:
                                    • API String ID: 801014965-0
                                    • Opcode ID: 372b72291a79fe7f323a7fd117d835006d69336e2c0488ca977e4fa79056e622
                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                    • Opcode Fuzzy Hash: 372b72291a79fe7f323a7fd117d835006d69336e2c0488ca977e4fa79056e622
                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                    Strings
                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.476065209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000004.00000002.476062418.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476068199.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476080919.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476084079.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    • API String ID: 774561529-2942426231
                                    • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                    • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                    • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                    • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • sprintf.MSVCRT ref: 00407C56
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,76A05360,00000000), ref: 00407C9B
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.476065209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000004.00000002.476062418.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476068199.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476080919.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476084079.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                    • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                    • API String ID: 3340711343-4063779371
                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 35 407ce0-407cfb GetModuleHandleW 36 407d01-407d43 GetProcAddress * 4 35->36 37 407f08-407f14 35->37 36->37 38 407d49-407d4f 36->38 38->37 39 407d55-407d5b 38->39 39->37 40 407d61-407d63 39->40 40->37 41 407d69-407d7e FindResourceA 40->41 41->37 42 407d84-407d8e LoadResource 41->42 42->37 43 407d94-407da1 LockResource 42->43 43->37 44 407da7-407db3 SizeofResource 43->44 44->37 45 407db9-407e4e sprintf * 2 MoveFileExA 44->45 45->37 47 407e54-407ef0 45->47 47->37 51 407ef2-407f01 47->51 51->37
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,76A05360,?,00000000), ref: 00407CEF
                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA,?,00000000), ref: 00407D0D
                                    • GetProcAddress.KERNEL32(00000000,CreateFileA,?,00000000), ref: 00407D1A
                                    • GetProcAddress.KERNEL32(00000000,WriteFile,?,00000000), ref: 00407D27
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle,?,00000000), ref: 00407D34
                                    • FindResourceA.KERNEL32 ref: 00407D74
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                    • sprintf.MSVCRT ref: 00407E01
                                    • sprintf.MSVCRT ref: 00407E18
                                    • MoveFileExA.KERNEL32 ref: 00407E2C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.476065209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000004.00000002.476062418.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476068199.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476070926.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476078183.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476080919.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476084079.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.476101754.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_400000_qCc1a4w5YZ.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                    • API String ID: 4072214828-1507730452
                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: /../$/..\$\../$\..\
                                    • API String ID: 3510742995-3885502717
                                    • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                    • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                    • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                    • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                    • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                    • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                    • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                    • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                    • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                    • API String ID: 2238633743-2459060434
                                    • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                    • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                    • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                    • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                    • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                    • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandleOpen$ManagerStart
                                    • String ID: cmd.exe /c "%s"
                                    • API String ID: 1485051382-955883872
                                    • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                    • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                    • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                    • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                    • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                    • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                    • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow$memcpy
                                    • String ID:
                                    • API String ID: 1881450474-3916222277
                                    • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                    • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                    • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                    • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                    • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                    • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                    • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                    • String ID: WANACRY!
                                    • API String ID: 283026544-1240840912
                                    • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                    • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                    • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                    • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID: $Q;@
                                    • API String ID: 2382887404-262343263
                                    • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                    • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                    • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                    • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID:
                                    • API String ID: 2382887404-3916222277
                                    • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                    • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                    • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                    • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$FreeProcessfree
                                    • String ID:
                                    • API String ID: 3428986607-0
                                    • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                    • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                    • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                    • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow
                                    • String ID:
                                    • API String ID: 941485209-0
                                    • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                    • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                    • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                    • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrow
                                    • String ID:
                                    • API String ID: 941485209-0
                                    • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                    • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                    • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                    • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                    • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                    • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                    • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ContextCryptRelease
                                    • String ID:
                                    • API String ID: 829835001-0
                                    • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                    • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                    • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                    • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                    • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                    • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                    • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                    • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                    • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                    • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                      • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                    • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                    • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                    • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                    • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                    • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                    • API String ID: 2238633743-1294736154
                                    • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                    • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                    • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                    • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %s%s$%s%s%s$:$\
                                    • API String ID: 0-1100577047
                                    • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                    • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                    • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                    • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __p___argv.MSVCRT(0040F538), ref: 00402040
                                    • strcmp.MSVCRT(?), ref: 0040204B
                                    • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                    • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                      • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                    • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                    • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                    • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                      • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                      • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                      • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                      • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                    • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                    • API String ID: 1074704982-2844324180
                                    • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                    • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                    • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                    • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                    • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                    • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                    • strlen.MSVCRT(?), ref: 004011A7
                                    • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                    • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                    • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                    • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                    • String ID: 0@$Software\$WanaCrypt0r
                                    • API String ID: 865909632-3421300005
                                    • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                    • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                    • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                    • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                    • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                    • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                    • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                    • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                      • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                      • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                    • String ID: %s\Intel$%s\ProgramData
                                    • API String ID: 3806094219-198707228
                                    • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                    • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                    • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                    • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                    • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                    • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                    • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                      • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                    • SetLastError.KERNEL32(0000045A), ref: 00402430
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                    • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                    • API String ID: 1900561814-3657104962
                                    • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                    • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                    • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                    • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                    • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                    • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                    • String ID: %s\%s
                                    • API String ID: 1036847564-4073750446
                                    • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                    • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                    • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                    • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                    • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                    • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                    • CloseHandle.KERNEL32(?), ref: 004010EC
                                    • CloseHandle.KERNEL32(?), ref: 004010F1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                    • String ID: D
                                    • API String ID: 786732093-2746444292
                                    • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                    • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                    • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                    • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                    • __p__fmode.MSVCRT ref: 004077FC
                                    • __p__commode.MSVCRT ref: 0040780A
                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                    • String ID:
                                    • API String ID: 3626615345-0
                                    • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                    • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                    • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                    • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                      • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                    • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                    • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                    • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                    • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                    • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                    • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                    • String ID:
                                    • API String ID: 2141228402-0
                                    • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                    • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                    • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                    • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                    • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                    • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Read$realloc
                                    • String ID: ?!@
                                    • API String ID: 1241503663-708128716
                                    • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                    • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                    • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                    • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: rand$wcslen$ComputerNamesrand
                                    • String ID:
                                    • API String ID: 3058258771-0
                                    • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                    • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                    • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                    • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                    • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                    • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                    • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                    • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                    • String ID:
                                    • API String ID: 2935503933-0
                                    • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                    • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                    • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                    • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                    • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                    • Sleep.KERNEL32(000003E8), ref: 00401F40
                                    • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleMutexOpenSleepsprintf
                                    • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                    • API String ID: 2780352083-2959021817
                                    • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                    • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                    • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                    • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                    • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                    • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??0exception@@ExceptionThrowmemcpy
                                    • String ID:
                                    • API String ID: 2382887404-0
                                    • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                    • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                    • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                    • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                    • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                    • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                    • fclose.MSVCRT(00000000), ref: 00401058
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: fclosefopenfreadfwrite
                                    • String ID: c.wnry
                                    • API String ID: 4000964834-3240288721
                                    • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                    • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                    • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                    • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                    • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                    • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                    • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                    • String ID:
                                    • API String ID: 2811923685-0
                                    • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                    • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                    • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                    • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Pointer$??2@Create
                                    • String ID:
                                    • API String ID: 1331958074-0
                                    • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                    • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                    • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                    • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                    • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_stricmp
                                    • String ID: P!@
                                    • API String ID: 1278613211-1774101457
                                    • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                    • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                    • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                    • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                    • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AttributesFilestrcmp
                                    • String ID: c.wnry
                                    • API String ID: 3324900478-3240288721
                                    • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                    • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                    • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                    • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??3@CloseHandle
                                    • String ID: $l@
                                    • API String ID: 3816424416-2140230165
                                    • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                    • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                    • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                    • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                    • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                    • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.340508351.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.340502387.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340511682.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340514790.000000000040E000.00000008.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000005.00000002.340517998.0000000000410000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_tasksche.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$Entermemcpy
                                    • String ID:
                                    • API String ID: 3435569088-0
                                    • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                    • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                    • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                    • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%