Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
v9xYj92wR3.dll

Overview

General Information

Sample name:v9xYj92wR3.dll
renamed because original name is a hash value
Original sample name:ef1a139863c90dc1fbdbc3036256e913.dll
Analysis ID:1591387
MD5:ef1a139863c90dc1fbdbc3036256e913
SHA1:136ced5acf410a009f9056d2d254cf39b039a228
SHA256:0b63a547f7b13e87bbfce8d2517d7433e485e9f6355c5fd4461e3505a8120afc
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5012 cmdline: loaddll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1436 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 1260 cmdline: rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 3368 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 5EEBE844531D50A5D01DBA3FBD3D50C5)
          • tasksche.exe (PID: 4488 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 02DE29EEA7BD9C1B72072E6D56972D02)
    • rundll32.exe (PID: 1928 cmdline: rundll32.exe C:\Users\user\Desktop\v9xYj92wR3.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2496 cmdline: rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 3272 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 5EEBE844531D50A5D01DBA3FBD3D50C5)
        • tasksche.exe (PID: 5780 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 02DE29EEA7BD9C1B72072E6D56972D02)
  • mssecsvc.exe (PID: 4908 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 5EEBE844531D50A5D01DBA3FBD3D50C5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
v9xYj92wR3.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    v9xYj92wR3.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    v9xYj92wR3.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\mssecsvc.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0x3136c:$x3: tasksche.exe
      • 0x4157c:$x3: tasksche.exe
      • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0x415d0:$x5: WNcry@2ol7
      • 0x313d7:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
      • 0xe048:$x7: mssecsvc.exe
      • 0x17350:$x7: mssecsvc.exe
      • 0x31344:$x8: C:\%s\qeriuwjhrf
      • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xe034:$s1: C:\%s\%s
      • 0x17338:$s1: C:\%s\%s
      • 0x31358:$s1: C:\%s\%s
      • 0x414d0:$s3: cmd.exe /c "%s"
      • 0x73a24:$s4: msg/m_portuguese.wnry
      • 0x2e68c:$s5: \\192.168.56.20\IPC$
      • 0x1ba81:$s6: \\172.16.99.5\IPC$
      • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
      • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
      • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
      • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      C:\Windows\mssecsvc.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
      • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
      • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
      • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
      • 0x1d439:$s1: __TREEID__PLACEHOLDER__
      • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
      • 0x1f508:$s1: __TREEID__PLACEHOLDER__
      • 0x20570:$s1: __TREEID__PLACEHOLDER__
      • 0x215d8:$s1: __TREEID__PLACEHOLDER__
      • 0x22640:$s1: __TREEID__PLACEHOLDER__
      • 0x236a8:$s1: __TREEID__PLACEHOLDER__
      • 0x24710:$s1: __TREEID__PLACEHOLDER__
      • 0x25778:$s1: __TREEID__PLACEHOLDER__
      • 0x267e0:$s1: __TREEID__PLACEHOLDER__
      • 0x27848:$s1: __TREEID__PLACEHOLDER__
      • 0x288b0:$s1: __TREEID__PLACEHOLDER__
      • 0x29918:$s1: __TREEID__PLACEHOLDER__
      • 0x2a980:$s1: __TREEID__PLACEHOLDER__
      • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
      • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e340:$s1: __TREEID__PLACEHOLDER__
      C:\Windows\mssecsvc.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvc.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
      • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
      • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      Click to see the 4 entries
      SourceRuleDescriptionAuthorStrings
      00000005.00000000.1697558652.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000009.00000002.1733476835.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000007.00000000.1716453373.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000006.00000000.1705199542.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            6.2.mssecsvc.exe.22a48c8.6.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            6.2.mssecsvc.exe.1d7e084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            9.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              9.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              9.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:34:02.185200+010020315153Misc activity104.16.167.22880192.168.2.449730TCP
              2025-01-14T23:34:02.871446+010020315153Misc activity104.16.167.22880192.168.2.449731TCP
              2025-01-14T23:34:04.878861+010020315153Misc activity104.16.167.22880192.168.2.449748TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:34:01.664159+010020242911A Network Trojan was detected192.168.2.4586741.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:34:02.184792+010020242981A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-14T23:34:02.865572+010020242981A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-14T23:34:04.878757+010020242981A Network Trojan was detected192.168.2.449748104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:34:02.184792+010020242991A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-14T23:34:02.865572+010020242991A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-14T23:34:04.878757+010020242991A Network Trojan was detected192.168.2.449748104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:34:02.184792+010020243011A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-14T23:34:02.865572+010020243011A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-14T23:34:04.878757+010020243011A Network Trojan was detected192.168.2.449748104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:34:02.184792+010020243021A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
              2025-01-14T23:34:02.865572+010020243021A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
              2025-01-14T23:34:04.878757+010020243021A Network Trojan was detected192.168.2.449748104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:34:02.184792+010028033043Unknown Traffic192.168.2.449730104.16.167.22880TCP
              2025-01-14T23:34:02.865572+010028033043Unknown Traffic192.168.2.449731104.16.167.22880TCP
              2025-01-14T23:34:04.878757+010028033043Unknown Traffic192.168.2.449748104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: v9xYj92wR3.dllAvira: detected
              Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 96%
              Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 96%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 96%
              Source: v9xYj92wR3.dllVirustotal: Detection: 93%Perma Link
              Source: v9xYj92wR3.dllReversingLabs: Detection: 92%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
              Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: v9xYj92wR3.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: v9xYj92wR3.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49748 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49748 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49748 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49748 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 22:34:02 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9021175319095e61-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 22:34:02 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902117577f731851-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 22:34:04 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90211763f8080f74-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: unknownNetwork traffic detected: IP country count 10
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.4:58674 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49748 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49731 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49731
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49748
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.180
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.180
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.180
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.180
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.189.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.94
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.94
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.94
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.1
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.94
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.1
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.1
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.1
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.1
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.1
              Source: unknownTCP traffic detected without corresponding DNS query: 139.228.101.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.178
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.178
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.178
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.178
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.1
              Source: unknownTCP traffic detected without corresponding DNS query: 81.219.229.1
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.21
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.21
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.21
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.1
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.1
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.1
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.21
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.1
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.1
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.1
              Source: unknownTCP traffic detected without corresponding DNS query: 164.225.163.1
              Source: unknownTCP traffic detected without corresponding DNS query: 136.149.42.58
              Source: unknownTCP traffic detected without corresponding DNS query: 136.149.42.58
              Source: unknownTCP traffic detected without corresponding DNS query: 136.149.42.58
              Source: unknownTCP traffic detected without corresponding DNS query: 136.149.42.1
              Source: unknownTCP traffic detected without corresponding DNS query: 136.149.42.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe.3.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000005.00000002.1718047725.0000000000D0E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.1718047725.0000000000D52000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2350558096.0000000000CBA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1733875189.0000000000AC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
              Source: mssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/P
              Source: mssecsvc.exe, 00000005.00000002.1718047725.0000000000D0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/p4
              Source: mssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com2
              Source: mssecsvc.exe, 00000006.00000002.2349982749.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
              Source: Yara matchFile source: v9xYj92wR3.dll, type: SAMPLE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1db0128.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22d696c.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d8d104.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22b3948.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22d696c.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22a48c8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1db0128.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22af8e8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.22b3948.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d890a4.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1d8d104.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000000.1697558652.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1733476835.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1705199542.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2350091304.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1717433655.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1725055995.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1733619842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2351017544.0000000001D8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2351305743.00000000022B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.1697696740.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1705364861.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1725185746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3368, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 3272, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: v9xYj92wR3.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: v9xYj92wR3.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22a48c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d7e084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1db0128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1db0128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1db0128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.22d696c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22d696c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22d696c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1d8d104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d8d104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1d8d104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22b3948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22b3948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.22b3948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.22d696c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22d696c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.22d696c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.22a48c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22a48c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1db0128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1db0128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1db0128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.22af8e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22af8e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.22b3948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.22b3948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d890a4.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d890a4.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1d8d104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1d8d104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000000.1716453373.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.1733066298.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.1732617381.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1733619842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2351017544.0000000001D8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2351305743.00000000022B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.1697696740.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1705364861.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1725185746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
              Source: mssecsvc.exe.3.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: v9xYj92wR3.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: v9xYj92wR3.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: v9xYj92wR3.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22a48c8.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d7e084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1db0128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1db0128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1db0128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.22d696c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22d696c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22d696c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1d8d104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d8d104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1d8d104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22b3948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22b3948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.22b3948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.22d696c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22d696c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.22d696c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.22a48c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22a48c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1db0128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1db0128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1db0128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.22af8e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22af8e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d7e084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.22b3948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.22b3948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d890a4.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d890a4.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1d8d104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1d8d104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000000.1716453373.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.1733066298.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.1732617381.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1733619842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2351017544.0000000001D8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2351305743.00000000022B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.1697696740.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1705364861.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1725185746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000007.00000000.1716453373.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000002.1733066298.000000000040E000.00000008.00000001.01000000.00000007.sdmp, v9xYj92wR3.dll, mssecsvc.exe.3.dr, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5080:120:WilError_03
              Source: v9xYj92wR3.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\v9xYj92wR3.dll,PlayGame
              Source: v9xYj92wR3.dllVirustotal: Detection: 93%
              Source: v9xYj92wR3.dllReversingLabs: Detection: 92%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\v9xYj92wR3.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\v9xYj92wR3.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: v9xYj92wR3.dllStatic file information: File size 5267459 > 1048576
              Source: v9xYj92wR3.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 2180Thread sleep count: 94 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 2180Thread sleep time: -188000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 4192Thread sleep count: 126 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 4192Thread sleep count: 47 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 2180Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Windows\tasksche.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000005.00000002.1718047725.0000000000D3B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
              Source: mssecsvc.exe, 00000006.00000002.2350558096.0000000000C98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
              Source: mssecsvc.exe, 00000005.00000002.1718047725.0000000000D75000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2350558096.0000000000CE7000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1733875189.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts2
              Service Execution
              1
              DLL Side-Loading
              11
              Process Injection
              31
              Virtualization/Sandbox Evasion
              LSASS Memory121
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Native API
              Logon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS22
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591387 Sample: v9xYj92wR3.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->47 49 bg.microsoft.map.fastly.net 2->49 65 Tries to download HTTP data from a sinkholed server 2->65 67 Suricata IDS alerts for network traffic 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 6 other signatures 2->71 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 rundll32.exe 1 10->21         started        24 conhost.exe 10->24         started        51 192.168.2.102 unknown unknown 12->51 53 192.168.2.103 unknown unknown 12->53 55 98 other IPs or domains 12->55 81 Connects to many different private IPs via SMB (likely to spread or exploit) 12->81 83 Connects to many different private IPs (likely to spread or exploit) 12->83 signatures6 process7 file8 26 rundll32.exe 16->26         started        63 Drops executables to the windows directory (C:\Windows) and starts them 18->63 28 mssecsvc.exe 7 18->28         started        43 C:\Windows\mssecsvc.exe, PE32 21->43 dropped signatures9 process10 file11 32 mssecsvc.exe 7 26->32         started        45 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->45 dropped 85 Drops executables to the windows directory (C:\Windows) and starts them 28->85 36 tasksche.exe 28->36         started        signatures12 process13 file14 41 C:\Windows\tasksche.exe, PE32 32->41 dropped 57 Antivirus detection for dropped file 32->57 59 Multi AV Scanner detection for dropped file 32->59 61 Machine Learning detection for dropped file 32->61 38 tasksche.exe 32->38         started        signatures15 process16 signatures17 73 Detected Wannacry Ransomware 38->73 75 Antivirus detection for dropped file 38->75 77 Multi AV Scanner detection for dropped file 38->77 79 Machine Learning detection for dropped file 38->79

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              v9xYj92wR3.dll93%VirustotalBrowse
              v9xYj92wR3.dll93%ReversingLabsWin32.Ransomware.WannaCry
              v9xYj92wR3.dll100%AviraTR/Ransom.Gen
              v9xYj92wR3.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\mssecsvc.exe100%Joe Sandbox ML
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)97%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\mssecsvc.exe96%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe97%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com20%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.3.drfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Pmssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com2mssecsvc.exe, 00000009.00000002.1733875189.0000000000A78000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/p4mssecsvc.exe, 00000005.00000002.1718047725.0000000000D0E000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000006.00000002.2349982749.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              213.254.242.1
                              unknownGermany
                              3257GTT-BACKBONEGTTDEfalse
                              136.228.53.1
                              unknownUnited States
                              2882MERIT-AS-26USfalse
                              89.149.92.1
                              unknownMoldova Republic of
                              31204SUNCOMMUNICATIONS-ASJVSunCommunicationsAutonomousSystfalse
                              189.180.145.232
                              unknownMexico
                              8151UninetSAdeCVMXfalse
                              103.162.19.244
                              unknownunknown
                              7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNefalse
                              103.162.19.1
                              unknownunknown
                              7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNefalse
                              163.112.40.156
                              unknownFrance
                              17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                              178.89.3.105
                              unknownKazakhstan
                              9198KAZTELECOM-ASKZfalse
                              132.223.93.133
                              unknownUnited States
                              17516NTTCOMWARENTTCOMWARECORPORATIONJPfalse
                              81.219.229.2
                              unknownPoland
                              12741AS-NETIAWarszawa02-822PLfalse
                              81.219.229.1
                              unknownPoland
                              12741AS-NETIAWarszawa02-822PLfalse
                              38.1.235.120
                              unknownUnited States
                              174COGENT-174USfalse
                              139.228.101.2
                              unknownIndonesia
                              23700FASTNET-AS-IDLinknet-FastnetASNIDfalse
                              139.228.101.1
                              unknownIndonesia
                              23700FASTNET-AS-IDLinknet-FastnetASNIDfalse
                              108.46.45.1
                              unknownUnited States
                              701UUNETUSfalse
                              132.223.93.1
                              unknownUnited States
                              17516NTTCOMWARENTTCOMWARECORPORATIONJPfalse
                              136.149.42.2
                              unknownUnited States
                              385AFCONC-BLOCK1-ASUSfalse
                              124.142.84.1
                              unknownJapan9824JTCL-JP-ASJupiterTelecommunicationCoLtdJPfalse
                              136.149.42.1
                              unknownUnited States
                              385AFCONC-BLOCK1-ASUSfalse
                              163.112.40.1
                              unknownFrance
                              17816CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovifalse
                              IP
                              192.168.2.148
                              192.168.2.149
                              192.168.2.146
                              192.168.2.147
                              192.168.2.140
                              192.168.2.141
                              192.168.2.144
                              192.168.2.145
                              192.168.2.142
                              192.168.2.143
                              192.168.2.159
                              192.168.2.157
                              192.168.2.158
                              192.168.2.151
                              192.168.2.152
                              192.168.2.150
                              192.168.2.155
                              192.168.2.156
                              192.168.2.153
                              192.168.2.154
                              192.168.2.126
                              192.168.2.247
                              192.168.2.127
                              192.168.2.248
                              192.168.2.124
                              192.168.2.245
                              192.168.2.125
                              192.168.2.246
                              192.168.2.128
                              192.168.2.249
                              192.168.2.129
                              192.168.2.240
                              192.168.2.122
                              192.168.2.243
                              192.168.2.123
                              192.168.2.244
                              192.168.2.120
                              192.168.2.241
                              192.168.2.121
                              192.168.2.242
                              192.168.2.97
                              192.168.2.137
                              192.168.2.96
                              192.168.2.138
                              192.168.2.99
                              192.168.2.135
                              192.168.2.98
                              192.168.2.136
                              192.168.2.139
                              192.168.2.250
                              192.168.2.130
                              192.168.2.251
                              192.168.2.91
                              192.168.2.90
                              192.168.2.93
                              192.168.2.133
                              192.168.2.254
                              192.168.2.92
                              192.168.2.134
                              192.168.2.95
                              192.168.2.131
                              192.168.2.252
                              192.168.2.94
                              192.168.2.132
                              192.168.2.253
                              192.168.2.104
                              192.168.2.225
                              192.168.2.105
                              192.168.2.226
                              192.168.2.102
                              192.168.2.223
                              192.168.2.103
                              192.168.2.224
                              192.168.2.108
                              192.168.2.229
                              192.168.2.109
                              192.168.2.106
                              192.168.2.227
                              192.168.2.107
                              192.168.2.228
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1591387
                              Start date and time:2025-01-14 23:33:07 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 4m 46s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:v9xYj92wR3.dll
                              renamed because original name is a hash value
                              Original Sample Name:ef1a139863c90dc1fbdbc3036256e913.dll
                              Detection:MAL
                              Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                              EGA Information:
                              • Successful, ratio: 66.7%
                              HCA Information:Failed
                              Cookbook Comments:
                              • Found application associated with file extension: .dll
                              • Stop behavior analysis, all processes terminated
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 4.245.163.56, 199.232.214.172, 2.17.190.73, 13.85.23.206, 20.3.187.198, 20.242.39.171, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target tasksche.exe, PID 4488 because there are no executed function
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              17:34:03API Interceptor1x Sleep call for process: loaddll32.exe modified
                              17:34:36API Interceptor112x Sleep call for process: mssecsvc.exe modified
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.combopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              87c6RORO31.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              bg.microsoft.map.fastly.nethttps://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              FjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
                              • 199.232.214.172
                              jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                              • 199.232.214.172
                              logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                              • 199.232.214.172
                              DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              WZ6RvDzQeq.exeGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              ea354192.pdfGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              Ecastillo-In Service Agreement.pdfGet hashmaliciousHTMLPhisherBrowse
                              • 199.232.210.172
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SUNCOMMUNICATIONS-ASJVSunCommunicationsAutonomousSystsh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 92.181.179.254
                              nabm68k.elfGet hashmaliciousUnknownBrowse
                              • 92.181.140.253
                              na.elfGet hashmaliciousUnknownBrowse
                              • 89.149.66.229
                              mirai.m68k.elfGet hashmaliciousMiraiBrowse
                              • 92.181.229.168
                              15k4cpuGzQ.elfGet hashmaliciousUnknownBrowse
                              • 92.181.177.211
                              HmBC8e0eux.elfGet hashmaliciousUnknownBrowse
                              • 92.181.229.143
                              huhu.x86_64.elfGet hashmaliciousMiraiBrowse
                              • 92.181.90.188
                              MtotV6x4uA.elfGet hashmaliciousMirai, MoobotBrowse
                              • 92.181.24.243
                              hydro.x86_64.elfGet hashmaliciousMoobotBrowse
                              • 89.149.66.255
                              c8O3JEibrM.elfGet hashmaliciousMiraiBrowse
                              • 92.181.90.185
                              MERIT-AS-26USg75NqH852l.elfGet hashmaliciousMirai, MoobotBrowse
                              • 142.54.9.196
                              coYnMdoXNc.elfGet hashmaliciousMiraiBrowse
                              • 66.219.127.216
                              7myCS48Y2sGet hashmaliciousMiraiBrowse
                              • 66.219.127.216
                              hGX7v1zhOeGet hashmaliciousMiraiBrowse
                              • 142.54.9.196
                              GTT-BACKBONEGTTDEmeth15.elfGet hashmaliciousMiraiBrowse
                              • 81.31.17.96
                              mNPTwHOuvT.exeGet hashmaliciousVidarBrowse
                              • 23.43.85.10
                              sora.arm.elfGet hashmaliciousMiraiBrowse
                              • 65.175.21.112
                              Fantazy.ppc.elfGet hashmaliciousUnknownBrowse
                              • 151.171.224.56
                              3.elfGet hashmaliciousUnknownBrowse
                              • 212.222.229.103
                              6.elfGet hashmaliciousUnknownBrowse
                              • 77.67.97.71
                              miori.x86.elfGet hashmaliciousUnknownBrowse
                              • 204.93.45.114
                              sora.sh4.elfGet hashmaliciousMiraiBrowse
                              • 66.227.51.71
                              sora.mips.elfGet hashmaliciousMiraiBrowse
                              • 212.221.104.230
                              w3245.exeGet hashmaliciousUnknownBrowse
                              • 23.43.85.38
                              UninetSAdeCVMX87c6RORO31.dllGet hashmaliciousWannacryBrowse
                              • 189.143.20.1
                              mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                              • 201.118.194.137
                              Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                              • 189.129.180.224
                              meth10.elfGet hashmaliciousMiraiBrowse
                              • 148.223.72.206
                              meth3.elfGet hashmaliciousMiraiBrowse
                              • 189.244.42.55
                              x86.elfGet hashmaliciousUnknownBrowse
                              • 189.162.156.204
                              spc.elfGet hashmaliciousUnknownBrowse
                              • 187.211.185.26
                              i486.elfGet hashmaliciousUnknownBrowse
                              • 201.135.254.103
                              meth2.elfGet hashmaliciousMiraiBrowse
                              • 189.172.103.22
                              mips.elfGet hashmaliciousUnknownBrowse
                              • 187.222.84.155
                              No context
                              No context
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.565866950536016
                              Encrypted:false
                              SSDEEP:98304:QqPoBhz1aRxcSUDk1xWa9P593R8yAVp2Hj:QqPe1CxcxkuadzR8yc4Hj
                              MD5:02DE29EEA7BD9C1B72072E6D56972D02
                              SHA1:608B9806718AB51E256F88EE933E1508B595CEC5
                              SHA-256:9B342E607DEB452AA94FF3BFDCA464A299CAA148B13799D3E944061476E11763
                              SHA-512:593890DB89D9C0086428385C4CCE7BAAB1D09EB32E566AC35F75561CDE9C1FF00D0ED0ACDC03C8431DE4AD3AC360DFA80D9BB5FAEFE0FBBF7C458EE7B5E66BE7
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 97%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\rundll32.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3723264
                              Entropy (8bit):7.523605019762237
                              Encrypted:false
                              SSDEEP:98304:XDqPoBhz1aRxcSUDk1xWa9P593R8yAVp2HI:XDqPe1CxcxkuadzR8yc4HI
                              MD5:5EEBE844531D50A5D01DBA3FBD3D50C5
                              SHA1:538F21ABAF8548A6AC79FDD5D73E3B2D7324DF38
                              SHA-256:7DA48D207D5F874159E2B8949B08C721CDECA402EC7DADD1680495EC606A83E9
                              SHA-512:5E3CD0ECF4B4452DA5DE41EB0A8AEC9371C36511F541569436BCC96D4988CDEF409ED19E834D16A059A539C2E0CD75A594245D95442DC6762884EAF04030AB3A
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 96%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.565866950536016
                              Encrypted:false
                              SSDEEP:98304:QqPoBhz1aRxcSUDk1xWa9P593R8yAVp2Hj:QqPe1CxcxkuadzR8yc4Hj
                              MD5:02DE29EEA7BD9C1B72072E6D56972D02
                              SHA1:608B9806718AB51E256F88EE933E1508B595CEC5
                              SHA-256:9B342E607DEB452AA94FF3BFDCA464A299CAA148B13799D3E944061476E11763
                              SHA-512:593890DB89D9C0086428385C4CCE7BAAB1D09EB32E566AC35F75561CDE9C1FF00D0ED0ACDC03C8431DE4AD3AC360DFA80D9BB5FAEFE0FBBF7C458EE7B5E66BE7
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 97%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):5.890916698165727
                              TrID:
                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                              • Generic Win/DOS Executable (2004/3) 0.20%
                              • DOS Executable Generic (2002/1) 0.20%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:v9xYj92wR3.dll
                              File size:5'267'459 bytes
                              MD5:ef1a139863c90dc1fbdbc3036256e913
                              SHA1:136ced5acf410a009f9056d2d254cf39b039a228
                              SHA256:0b63a547f7b13e87bbfce8d2517d7433e485e9f6355c5fd4461e3505a8120afc
                              SHA512:387abc25cb99b69ee5404007f4c1edac3c145c61b3730e697e7d0c4842e2f3a2cbefd7669f1ffad7fe426556d11e01df655a1e30176069e4310eb74dbc3e8373
                              SSDEEP:98304:TDqPoBhz1aRxcSUDk1xWa9P593R8yAVp2H:TDqPe1CxcxkuadzR8yc4H
                              TLSH:233633A8626CB2BCF0541AB44473492ABBB73C5977BA5E1F57C087A70C03B5B6F84641
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                              Icon Hash:7ae282899bbab082
                              Entrypoint:0x100011e9
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x10000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                              DLL Characteristics:
                              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                              Instruction
                              push ebp
                              mov ebp, esp
                              push ebx
                              mov ebx, dword ptr [ebp+08h]
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              push edi
                              mov edi, dword ptr [ebp+10h]
                              test esi, esi
                              jne 00007F260919C82Bh
                              cmp dword ptr [10003140h], 00000000h
                              jmp 00007F260919C848h
                              cmp esi, 01h
                              je 00007F260919C827h
                              cmp esi, 02h
                              jne 00007F260919C844h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F260919C82Bh
                              push edi
                              push esi
                              push ebx
                              call eax
                              test eax, eax
                              je 00007F260919C82Eh
                              push edi
                              push esi
                              push ebx
                              call 00007F260919C73Ah
                              test eax, eax
                              jne 00007F260919C826h
                              xor eax, eax
                              jmp 00007F260919C870h
                              push edi
                              push esi
                              push ebx
                              call 00007F260919C5ECh
                              cmp esi, 01h
                              mov dword ptr [ebp+0Ch], eax
                              jne 00007F260919C82Eh
                              test eax, eax
                              jne 00007F260919C859h
                              push edi
                              push eax
                              push ebx
                              call 00007F260919C716h
                              test esi, esi
                              je 00007F260919C827h
                              cmp esi, 03h
                              jne 00007F260919C848h
                              push edi
                              push esi
                              push ebx
                              call 00007F260919C705h
                              test eax, eax
                              jne 00007F260919C825h
                              and dword ptr [ebp+0Ch], eax
                              cmp dword ptr [ebp+0Ch], 00000000h
                              je 00007F260919C833h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F260919C82Ah
                              push edi
                              push esi
                              push ebx
                              call eax
                              mov dword ptr [ebp+0Ch], eax
                              mov eax, dword ptr [ebp+0Ch]
                              pop edi
                              pop esi
                              pop ebx
                              pop ebp
                              retn 000Ch
                              jmp dword ptr [10002028h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              Programming Language:
                              • [ C ] VS98 (6.0) build 8168
                              • [C++] VS98 (6.0) build 8168
                              • [RES] VS98 (6.0) cvtres build 1720
                              • [LNK] VS98 (6.0) imp/exp build 8168
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x40000x5000600x50100090bb17f643858e18c90e972a41842e6aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              W0x40600x500000dataEnglishUnited States0.8770942687988281
                              DLLImport
                              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                              NameOrdinalAddress
                              PlayGame10x10001114
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-14T23:34:01.664159+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.4586741.1.1.153UDP
                              2025-01-14T23:34:02.184792+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730104.16.167.22880TCP
                              2025-01-14T23:34:02.184792+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449730104.16.167.22880TCP
                              2025-01-14T23:34:02.184792+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449730104.16.167.22880TCP
                              2025-01-14T23:34:02.184792+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449730104.16.167.22880TCP
                              2025-01-14T23:34:02.184792+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449730104.16.167.22880TCP
                              2025-01-14T23:34:02.185200+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449730TCP
                              2025-01-14T23:34:02.865572+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449731104.16.167.22880TCP
                              2025-01-14T23:34:02.865572+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449731104.16.167.22880TCP
                              2025-01-14T23:34:02.865572+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449731104.16.167.22880TCP
                              2025-01-14T23:34:02.865572+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449731104.16.167.22880TCP
                              2025-01-14T23:34:02.865572+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449731104.16.167.22880TCP
                              2025-01-14T23:34:02.871446+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449731TCP
                              2025-01-14T23:34:04.878757+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449748104.16.167.22880TCP
                              2025-01-14T23:34:04.878757+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449748104.16.167.22880TCP
                              2025-01-14T23:34:04.878757+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449748104.16.167.22880TCP
                              2025-01-14T23:34:04.878757+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449748104.16.167.22880TCP
                              2025-01-14T23:34:04.878757+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449748104.16.167.22880TCP
                              2025-01-14T23:34:04.878861+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449748TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 23:34:01.678101063 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:01.683141947 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:01.683234930 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:01.683470964 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:01.688359976 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.184608936 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.184792042 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.184890032 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.185199976 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.185281992 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.189697981 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.381886005 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.387120962 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.387397051 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.387480021 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.392292976 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.865403891 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.865518093 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:02.865571976 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.865619898 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.866000891 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:02.871445894 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:03.307543993 CET49732445192.168.2.481.189.170.180
                              Jan 14, 2025 23:34:03.313133001 CET4454973281.189.170.180192.168.2.4
                              Jan 14, 2025 23:34:03.313396931 CET49732445192.168.2.481.189.170.180
                              Jan 14, 2025 23:34:03.319153070 CET49732445192.168.2.481.189.170.180
                              Jan 14, 2025 23:34:03.319444895 CET49733445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:03.324520111 CET4454973281.189.170.180192.168.2.4
                              Jan 14, 2025 23:34:03.324568033 CET4454973381.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:03.324589014 CET49732445192.168.2.481.189.170.180
                              Jan 14, 2025 23:34:03.324630976 CET49733445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:03.325010061 CET49733445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:03.329866886 CET4454973381.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:03.329924107 CET49733445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:03.366102934 CET49735445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:03.371066093 CET4454973581.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:03.371133089 CET49735445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:03.371165037 CET49735445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:03.376049042 CET4454973581.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:03.952697039 CET49675443192.168.2.4173.222.162.32
                              Jan 14, 2025 23:34:04.371974945 CET4974880192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:04.377091885 CET8049748104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:04.380669117 CET4974880192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:04.380773067 CET4974880192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:04.385682106 CET8049748104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:04.878694057 CET8049748104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:04.878757000 CET4974880192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:04.878860950 CET8049748104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:04.878865004 CET4974880192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:04.878909111 CET4974880192.168.2.4104.16.167.228
                              Jan 14, 2025 23:34:04.883845091 CET8049748104.16.167.228192.168.2.4
                              Jan 14, 2025 23:34:05.156874895 CET49758445192.168.2.4139.228.101.94
                              Jan 14, 2025 23:34:05.161997080 CET44549758139.228.101.94192.168.2.4
                              Jan 14, 2025 23:34:05.162090063 CET49758445192.168.2.4139.228.101.94
                              Jan 14, 2025 23:34:05.162235975 CET49758445192.168.2.4139.228.101.94
                              Jan 14, 2025 23:34:05.162421942 CET49759445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:05.167192936 CET44549758139.228.101.94192.168.2.4
                              Jan 14, 2025 23:34:05.167263031 CET49758445192.168.2.4139.228.101.94
                              Jan 14, 2025 23:34:05.167275906 CET44549759139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:05.167335987 CET49759445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:05.167361021 CET49759445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:05.168514013 CET49760445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:05.172276974 CET44549759139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:05.172344923 CET49759445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:05.173398018 CET44549760139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:05.173477888 CET49760445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:05.173569918 CET49760445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:05.178343058 CET44549760139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:07.172463894 CET49781445192.168.2.481.219.229.178
                              Jan 14, 2025 23:34:07.177786112 CET4454978181.219.229.178192.168.2.4
                              Jan 14, 2025 23:34:07.177855015 CET49781445192.168.2.481.219.229.178
                              Jan 14, 2025 23:34:07.177917957 CET49781445192.168.2.481.219.229.178
                              Jan 14, 2025 23:34:07.178093910 CET49782445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:07.183000088 CET4454978181.219.229.178192.168.2.4
                              Jan 14, 2025 23:34:07.183017969 CET4454978281.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:07.183060884 CET49781445192.168.2.481.219.229.178
                              Jan 14, 2025 23:34:07.183106899 CET49782445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:07.183177948 CET49782445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:07.184557915 CET49783445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:07.188134909 CET4454978281.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:07.188198090 CET49782445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:07.189424038 CET4454978381.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:07.189492941 CET49783445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:07.189544916 CET49783445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:07.194346905 CET4454978381.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:09.188890934 CET49805445192.168.2.4164.225.163.21
                              Jan 14, 2025 23:34:09.194185972 CET44549805164.225.163.21192.168.2.4
                              Jan 14, 2025 23:34:09.194360971 CET49805445192.168.2.4164.225.163.21
                              Jan 14, 2025 23:34:09.194360971 CET49805445192.168.2.4164.225.163.21
                              Jan 14, 2025 23:34:09.194561958 CET49806445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:09.199831009 CET44549806164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:09.199928999 CET44549805164.225.163.21192.168.2.4
                              Jan 14, 2025 23:34:09.200088024 CET49806445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:09.200088978 CET49806445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:09.200093031 CET49805445192.168.2.4164.225.163.21
                              Jan 14, 2025 23:34:09.201323032 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:09.205813885 CET44549806164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:09.206005096 CET49806445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:09.206361055 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:09.206433058 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:09.206464052 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:09.211368084 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:11.203819990 CET49830445192.168.2.4136.149.42.58
                              Jan 14, 2025 23:34:11.286562920 CET44549830136.149.42.58192.168.2.4
                              Jan 14, 2025 23:34:11.286648035 CET49830445192.168.2.4136.149.42.58
                              Jan 14, 2025 23:34:11.286699057 CET49830445192.168.2.4136.149.42.58
                              Jan 14, 2025 23:34:11.286955118 CET49832445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:11.291847944 CET44549832136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:11.291907072 CET44549830136.149.42.58192.168.2.4
                              Jan 14, 2025 23:34:11.291949034 CET49832445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:11.291960001 CET49830445192.168.2.4136.149.42.58
                              Jan 14, 2025 23:34:11.292232990 CET49832445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:11.292958021 CET49833445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:11.297128916 CET44549832136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:11.297236919 CET49832445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:11.297908068 CET44549833136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:11.297975063 CET49833445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:11.298008919 CET49833445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:11.302903891 CET44549833136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:13.221333027 CET49853445192.168.2.42.107.176.128
                              Jan 14, 2025 23:34:13.228022099 CET445498532.107.176.128192.168.2.4
                              Jan 14, 2025 23:34:13.228128910 CET49853445192.168.2.42.107.176.128
                              Jan 14, 2025 23:34:13.228615999 CET49853445192.168.2.42.107.176.128
                              Jan 14, 2025 23:34:13.228854895 CET49854445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:13.233438969 CET445498532.107.176.128192.168.2.4
                              Jan 14, 2025 23:34:13.233521938 CET49853445192.168.2.42.107.176.128
                              Jan 14, 2025 23:34:13.233700991 CET445498542.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:13.233794928 CET49854445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:13.233836889 CET49854445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:13.235256910 CET49855445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:13.238857985 CET445498542.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:13.238929987 CET49854445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:13.240298033 CET445498552.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:13.240494013 CET49855445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:13.246002913 CET49855445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:13.251338005 CET445498552.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:15.234307051 CET49877445192.168.2.4168.32.110.87
                              Jan 14, 2025 23:34:15.241786957 CET44549877168.32.110.87192.168.2.4
                              Jan 14, 2025 23:34:15.242016077 CET49877445192.168.2.4168.32.110.87
                              Jan 14, 2025 23:34:15.242017031 CET49877445192.168.2.4168.32.110.87
                              Jan 14, 2025 23:34:15.242224932 CET49878445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:15.247524023 CET44549878168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:15.247569084 CET44549877168.32.110.87192.168.2.4
                              Jan 14, 2025 23:34:15.247617006 CET49878445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:15.247668028 CET49877445192.168.2.4168.32.110.87
                              Jan 14, 2025 23:34:15.247704983 CET49878445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:15.247997046 CET49879445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:15.252684116 CET44549878168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:15.252762079 CET49878445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:15.252846003 CET44549879168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:15.252931118 CET49879445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:15.252964020 CET49879445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:15.257828951 CET44549879168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:17.253632069 CET49902445192.168.2.48.7.204.169
                              Jan 14, 2025 23:34:17.259037971 CET445499028.7.204.169192.168.2.4
                              Jan 14, 2025 23:34:17.260812044 CET49902445192.168.2.48.7.204.169
                              Jan 14, 2025 23:34:17.260812044 CET49902445192.168.2.48.7.204.169
                              Jan 14, 2025 23:34:17.263559103 CET49904445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:17.266526937 CET445499028.7.204.169192.168.2.4
                              Jan 14, 2025 23:34:17.268498898 CET445499048.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:17.268603086 CET49904445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:17.268677950 CET49902445192.168.2.48.7.204.169
                              Jan 14, 2025 23:34:17.271796942 CET49905445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:17.271797895 CET49904445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:17.276700020 CET445499058.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:17.276731968 CET445499048.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:17.280761957 CET49904445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:17.280766010 CET49905445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:17.284724951 CET49905445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:17.289792061 CET445499058.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:19.265818119 CET49931445192.168.2.4189.180.145.232
                              Jan 14, 2025 23:34:19.271017075 CET44549931189.180.145.232192.168.2.4
                              Jan 14, 2025 23:34:19.271856070 CET49931445192.168.2.4189.180.145.232
                              Jan 14, 2025 23:34:19.271897078 CET49931445192.168.2.4189.180.145.232
                              Jan 14, 2025 23:34:19.271987915 CET49932445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:19.276834011 CET44549932189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:19.276962996 CET44549931189.180.145.232192.168.2.4
                              Jan 14, 2025 23:34:19.277045012 CET49931445192.168.2.4189.180.145.232
                              Jan 14, 2025 23:34:19.277048111 CET49932445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:19.277127028 CET49932445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:19.277364016 CET49933445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:19.282021046 CET44549932189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:19.282121897 CET49932445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:19.282219887 CET44549933189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:19.282286882 CET49933445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:19.282326937 CET49933445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:19.287147045 CET44549933189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:20.129832983 CET4972380192.168.2.4199.232.210.172
                              Jan 14, 2025 23:34:20.134963036 CET8049723199.232.210.172192.168.2.4
                              Jan 14, 2025 23:34:20.135035038 CET4972380192.168.2.4199.232.210.172
                              Jan 14, 2025 23:34:21.281188011 CET49957445192.168.2.4169.213.232.198
                              Jan 14, 2025 23:34:21.286312103 CET44549957169.213.232.198192.168.2.4
                              Jan 14, 2025 23:34:21.286397934 CET49957445192.168.2.4169.213.232.198
                              Jan 14, 2025 23:34:21.286438942 CET49957445192.168.2.4169.213.232.198
                              Jan 14, 2025 23:34:21.286636114 CET49958445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:21.291630030 CET44549957169.213.232.198192.168.2.4
                              Jan 14, 2025 23:34:21.291666031 CET44549958169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:21.291723967 CET49957445192.168.2.4169.213.232.198
                              Jan 14, 2025 23:34:21.291766882 CET49958445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:21.291846991 CET49958445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:21.292114973 CET49959445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:21.296823978 CET44549958169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:21.296878099 CET49958445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:21.296938896 CET44549959169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:21.297002077 CET49959445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:21.297029972 CET49959445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:21.302743912 CET44549959169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:23.296992064 CET49982445192.168.2.414.17.157.176
                              Jan 14, 2025 23:34:23.301907063 CET4454998214.17.157.176192.168.2.4
                              Jan 14, 2025 23:34:23.301992893 CET49982445192.168.2.414.17.157.176
                              Jan 14, 2025 23:34:23.302050114 CET49982445192.168.2.414.17.157.176
                              Jan 14, 2025 23:34:23.302158117 CET49983445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:23.306979895 CET4454998214.17.157.176192.168.2.4
                              Jan 14, 2025 23:34:23.307012081 CET4454998314.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:23.307045937 CET49982445192.168.2.414.17.157.176
                              Jan 14, 2025 23:34:23.307076931 CET49983445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:23.307147026 CET49983445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:23.307532072 CET49984445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:23.312069893 CET4454998314.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:23.312131882 CET49983445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:23.312416077 CET4454998414.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:23.312500954 CET49984445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:23.312500954 CET49984445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:23.317332983 CET4454998414.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:24.766377926 CET4454973581.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:24.766473055 CET49735445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:24.766515017 CET49735445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:24.766560078 CET49735445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:24.771500111 CET4454973581.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:24.771533966 CET4454973581.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:25.312285900 CET50005445192.168.2.4172.155.89.66
                              Jan 14, 2025 23:34:25.317106009 CET44550005172.155.89.66192.168.2.4
                              Jan 14, 2025 23:34:25.317177057 CET50005445192.168.2.4172.155.89.66
                              Jan 14, 2025 23:34:25.317202091 CET50005445192.168.2.4172.155.89.66
                              Jan 14, 2025 23:34:25.317286968 CET50006445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:25.322170973 CET44550006172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:25.322180033 CET44550005172.155.89.66192.168.2.4
                              Jan 14, 2025 23:34:25.322237968 CET50005445192.168.2.4172.155.89.66
                              Jan 14, 2025 23:34:25.322253942 CET50006445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:25.322302103 CET50006445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:25.322526932 CET50007445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:25.327198982 CET44550006172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:25.327253103 CET50006445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:25.327322960 CET44550007172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:25.327383041 CET50007445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:25.327428102 CET50007445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:25.332174063 CET44550007172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:26.547653913 CET44549760139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:26.547728062 CET49760445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:26.547808886 CET49760445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:26.547883987 CET49760445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:26.552560091 CET44549760139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:26.552673101 CET44549760139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:27.328859091 CET50029445192.168.2.4208.190.35.155
                              Jan 14, 2025 23:34:27.333664894 CET44550029208.190.35.155192.168.2.4
                              Jan 14, 2025 23:34:27.335000038 CET50029445192.168.2.4208.190.35.155
                              Jan 14, 2025 23:34:27.335163116 CET50029445192.168.2.4208.190.35.155
                              Jan 14, 2025 23:34:27.335324049 CET50030445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:27.339993000 CET44550029208.190.35.155192.168.2.4
                              Jan 14, 2025 23:34:27.340074062 CET44550030208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:27.340133905 CET50029445192.168.2.4208.190.35.155
                              Jan 14, 2025 23:34:27.340163946 CET50030445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:27.340205908 CET50030445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:27.340415955 CET50031445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:27.345098972 CET44550030208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:27.345148087 CET50030445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:27.345313072 CET44550031208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:27.347343922 CET50031445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:27.347392082 CET50031445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:27.352195978 CET44550031208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:27.781303883 CET50036445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:27.786149025 CET4455003681.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:27.787403107 CET50036445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:27.787467957 CET50036445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:27.792192936 CET4455003681.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:28.559204102 CET4454978381.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:28.559426069 CET49783445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:28.559714079 CET49783445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:28.559782982 CET49783445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:28.564495087 CET4454978381.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:28.564516068 CET4454978381.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:29.343782902 CET50037445192.168.2.4209.26.176.138
                              Jan 14, 2025 23:34:29.348681927 CET44550037209.26.176.138192.168.2.4
                              Jan 14, 2025 23:34:29.348756075 CET50037445192.168.2.4209.26.176.138
                              Jan 14, 2025 23:34:29.348783970 CET50037445192.168.2.4209.26.176.138
                              Jan 14, 2025 23:34:29.348900080 CET50038445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:29.353795052 CET44550037209.26.176.138192.168.2.4
                              Jan 14, 2025 23:34:29.353827953 CET44550038209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:29.353893995 CET50038445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:29.353902102 CET44550037209.26.176.138192.168.2.4
                              Jan 14, 2025 23:34:29.353951931 CET50037445192.168.2.4209.26.176.138
                              Jan 14, 2025 23:34:29.353979111 CET50038445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:29.354274035 CET50039445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:29.358871937 CET44550038209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:29.358939886 CET50038445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:29.359133959 CET44550039209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:29.359196901 CET50039445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:29.359220028 CET50039445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:29.364063978 CET44550039209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:29.562401056 CET50040445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:29.567193031 CET44550040139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:29.567297935 CET50040445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:29.571470976 CET50040445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:29.576230049 CET44550040139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:31.359739065 CET50041445192.168.2.4153.24.211.215
                              Jan 14, 2025 23:34:31.423288107 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.423419952 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.423449993 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:31.423485994 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:31.423485994 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:31.423541069 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:31.423580885 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.423633099 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:31.424072027 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.424118996 CET49807445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:31.424829006 CET44550041153.24.211.215192.168.2.4
                              Jan 14, 2025 23:34:31.424988985 CET50041445192.168.2.4153.24.211.215
                              Jan 14, 2025 23:34:31.424988985 CET50041445192.168.2.4153.24.211.215
                              Jan 14, 2025 23:34:31.425098896 CET50042445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:31.428352118 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.428366899 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.428508043 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.428582907 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.433100939 CET44549807164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:31.433115005 CET44550042153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:31.433134079 CET44550041153.24.211.215192.168.2.4
                              Jan 14, 2025 23:34:31.433186054 CET50042445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:31.433226109 CET50041445192.168.2.4153.24.211.215
                              Jan 14, 2025 23:34:31.433506966 CET50042445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:31.433507919 CET50043445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:31.438328028 CET44550043153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:31.438344002 CET44550042153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:31.438395977 CET50043445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:31.438425064 CET50042445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:31.438466072 CET50043445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:31.443325043 CET44550043153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:31.562304020 CET50044445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:31.568989992 CET4455004481.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:31.569063902 CET50044445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:31.569103956 CET50044445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:31.574043989 CET4455004481.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:32.688230991 CET44549833136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:32.691072941 CET49833445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:32.691171885 CET49833445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:32.691293001 CET49833445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:32.696011066 CET44549833136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:32.696249962 CET44549833136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:33.375166893 CET50045445192.168.2.4131.220.220.39
                              Jan 14, 2025 23:34:33.380110025 CET44550045131.220.220.39192.168.2.4
                              Jan 14, 2025 23:34:33.380317926 CET50045445192.168.2.4131.220.220.39
                              Jan 14, 2025 23:34:33.380319118 CET50045445192.168.2.4131.220.220.39
                              Jan 14, 2025 23:34:33.380383015 CET50046445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:33.385394096 CET44550046131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:33.385402918 CET44550045131.220.220.39192.168.2.4
                              Jan 14, 2025 23:34:33.385452032 CET50045445192.168.2.4131.220.220.39
                              Jan 14, 2025 23:34:33.385548115 CET50046445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:33.385548115 CET50046445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:33.385750055 CET50047445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:33.390614986 CET44550046131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:33.390624046 CET44550047131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:33.390678883 CET50046445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:33.390819073 CET50047445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:33.390819073 CET50047445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:33.395596981 CET44550047131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:34.437576056 CET50048445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:34.442442894 CET44550048164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:34.442529917 CET50048445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:34.442600012 CET50048445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:34.447928905 CET44550048164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:34.612198114 CET445498552.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:34.612303019 CET49855445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:34.612387896 CET49855445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:34.612451077 CET49855445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:34.617889881 CET445498552.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:34.618051052 CET445498552.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:35.401467085 CET50049445192.168.2.438.1.235.120
                              Jan 14, 2025 23:34:35.703169107 CET50050445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:36.206144094 CET4455004938.1.235.120192.168.2.4
                              Jan 14, 2025 23:34:36.206155062 CET44550050136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:36.206238031 CET50049445192.168.2.438.1.235.120
                              Jan 14, 2025 23:34:36.206254959 CET50050445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:36.206391096 CET50049445192.168.2.438.1.235.120
                              Jan 14, 2025 23:34:36.206636906 CET50051445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:36.206705093 CET50050445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:36.214021921 CET4455005138.1.235.1192.168.2.4
                              Jan 14, 2025 23:34:36.214030981 CET44550050136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:36.214142084 CET50051445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:36.214142084 CET50051445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:36.214212894 CET4455004938.1.235.120192.168.2.4
                              Jan 14, 2025 23:34:36.214276075 CET50049445192.168.2.438.1.235.120
                              Jan 14, 2025 23:34:36.214485884 CET50052445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:36.219310999 CET4455005238.1.235.1192.168.2.4
                              Jan 14, 2025 23:34:36.219383001 CET50052445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:36.219415903 CET50052445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:36.219429970 CET4455005138.1.235.1192.168.2.4
                              Jan 14, 2025 23:34:36.219497919 CET50051445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:36.226028919 CET4455005238.1.235.1192.168.2.4
                              Jan 14, 2025 23:34:36.606548071 CET44549879168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:36.606676102 CET49879445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:36.606926918 CET49879445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:36.606926918 CET49879445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:36.611686945 CET44549879168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:36.611798048 CET44549879168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:37.551405907 CET50053445192.168.2.4213.254.242.30
                              Jan 14, 2025 23:34:37.556325912 CET44550053213.254.242.30192.168.2.4
                              Jan 14, 2025 23:34:37.556396961 CET50053445192.168.2.4213.254.242.30
                              Jan 14, 2025 23:34:37.558073044 CET50053445192.168.2.4213.254.242.30
                              Jan 14, 2025 23:34:37.558242083 CET50054445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:37.562906981 CET44550053213.254.242.30192.168.2.4
                              Jan 14, 2025 23:34:37.562974930 CET50053445192.168.2.4213.254.242.30
                              Jan 14, 2025 23:34:37.563020945 CET44550054213.254.242.1192.168.2.4
                              Jan 14, 2025 23:34:37.563070059 CET50054445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:37.564939976 CET50054445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:37.569849014 CET44550054213.254.242.1192.168.2.4
                              Jan 14, 2025 23:34:37.569892883 CET50054445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:37.577456951 CET50055445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:37.582261086 CET44550055213.254.242.1192.168.2.4
                              Jan 14, 2025 23:34:37.582406998 CET50055445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:37.582406998 CET50055445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:37.587214947 CET44550055213.254.242.1192.168.2.4
                              Jan 14, 2025 23:34:37.625063896 CET50056445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:37.629925013 CET445500562.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:37.630017996 CET50056445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:37.630064011 CET50056445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:37.634848118 CET445500562.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:38.638394117 CET445499058.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:38.638465881 CET49905445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:38.638510942 CET49905445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:38.638566971 CET49905445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:38.643359900 CET445499058.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:38.643369913 CET445499058.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:39.297091007 CET50057445192.168.2.4136.228.53.38
                              Jan 14, 2025 23:34:39.301852942 CET44550057136.228.53.38192.168.2.4
                              Jan 14, 2025 23:34:39.301938057 CET50057445192.168.2.4136.228.53.38
                              Jan 14, 2025 23:34:39.301956892 CET50057445192.168.2.4136.228.53.38
                              Jan 14, 2025 23:34:39.302061081 CET50058445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:34:39.306848049 CET44550057136.228.53.38192.168.2.4
                              Jan 14, 2025 23:34:39.306905031 CET50057445192.168.2.4136.228.53.38
                              Jan 14, 2025 23:34:39.306922913 CET44550058136.228.53.1192.168.2.4
                              Jan 14, 2025 23:34:39.306982040 CET50058445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:34:39.307055950 CET50058445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:34:39.307280064 CET50059445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:34:39.311980009 CET44550058136.228.53.1192.168.2.4
                              Jan 14, 2025 23:34:39.312052011 CET50058445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:34:39.312134027 CET44550059136.228.53.1192.168.2.4
                              Jan 14, 2025 23:34:39.312191010 CET50059445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:34:39.312227011 CET50059445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:34:39.316992044 CET44550059136.228.53.1192.168.2.4
                              Jan 14, 2025 23:34:39.609498978 CET50060445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:39.614396095 CET44550060168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:39.614483118 CET50060445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:39.614547014 CET50060445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:34:39.619286060 CET44550060168.32.110.1192.168.2.4
                              Jan 14, 2025 23:34:40.637748957 CET44549933189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:40.637970924 CET49933445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:40.637970924 CET49933445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:40.637970924 CET49933445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:40.642971992 CET44549933189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:40.642981052 CET44549933189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:41.047178030 CET50061445192.168.2.478.77.111.241
                              Jan 14, 2025 23:34:41.051959038 CET4455006178.77.111.241192.168.2.4
                              Jan 14, 2025 23:34:41.052849054 CET50061445192.168.2.478.77.111.241
                              Jan 14, 2025 23:34:41.052865982 CET50061445192.168.2.478.77.111.241
                              Jan 14, 2025 23:34:41.052993059 CET50062445192.168.2.478.77.111.1
                              Jan 14, 2025 23:34:41.057714939 CET4455006178.77.111.241192.168.2.4
                              Jan 14, 2025 23:34:41.057768106 CET4455006278.77.111.1192.168.2.4
                              Jan 14, 2025 23:34:41.057840109 CET50062445192.168.2.478.77.111.1
                              Jan 14, 2025 23:34:41.057840109 CET50062445192.168.2.478.77.111.1
                              Jan 14, 2025 23:34:41.057940960 CET4455006178.77.111.241192.168.2.4
                              Jan 14, 2025 23:34:41.058064938 CET50063445192.168.2.478.77.111.1
                              Jan 14, 2025 23:34:41.058120012 CET50061445192.168.2.478.77.111.241
                              Jan 14, 2025 23:34:41.062771082 CET4455006278.77.111.1192.168.2.4
                              Jan 14, 2025 23:34:41.062961102 CET4455006378.77.111.1192.168.2.4
                              Jan 14, 2025 23:34:41.063036919 CET50063445192.168.2.478.77.111.1
                              Jan 14, 2025 23:34:41.063083887 CET50063445192.168.2.478.77.111.1
                              Jan 14, 2025 23:34:41.063354015 CET50062445192.168.2.478.77.111.1
                              Jan 14, 2025 23:34:41.067847967 CET4455006378.77.111.1192.168.2.4
                              Jan 14, 2025 23:34:41.640655041 CET50064445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:41.645586014 CET445500648.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:41.648416996 CET50064445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:41.648458958 CET50064445192.168.2.48.7.204.1
                              Jan 14, 2025 23:34:41.653251886 CET445500648.7.204.1192.168.2.4
                              Jan 14, 2025 23:34:42.656016111 CET44549959169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:42.659034967 CET49959445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:42.659079075 CET49959445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:42.659126043 CET49959445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:42.663853884 CET44549959169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:42.663863897 CET44549959169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:42.688000917 CET50065445192.168.2.4178.89.3.105
                              Jan 14, 2025 23:34:42.695003033 CET44550065178.89.3.105192.168.2.4
                              Jan 14, 2025 23:34:42.695547104 CET50065445192.168.2.4178.89.3.105
                              Jan 14, 2025 23:34:42.695617914 CET50065445192.168.2.4178.89.3.105
                              Jan 14, 2025 23:34:42.695768118 CET50066445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:34:42.702683926 CET44550066178.89.3.1192.168.2.4
                              Jan 14, 2025 23:34:42.702708960 CET44550065178.89.3.105192.168.2.4
                              Jan 14, 2025 23:34:42.702796936 CET50065445192.168.2.4178.89.3.105
                              Jan 14, 2025 23:34:42.702796936 CET50066445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:34:42.702886105 CET50066445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:34:42.703305960 CET50067445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:34:42.710042953 CET44550066178.89.3.1192.168.2.4
                              Jan 14, 2025 23:34:42.710328102 CET44550067178.89.3.1192.168.2.4
                              Jan 14, 2025 23:34:42.710388899 CET50066445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:34:42.710412979 CET50067445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:34:42.710455894 CET50067445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:34:42.715188980 CET44550067178.89.3.1192.168.2.4
                              Jan 14, 2025 23:34:43.640604973 CET50068445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:43.647284985 CET44550068189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:43.647361040 CET50068445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:43.647398949 CET50068445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:34:43.653368950 CET44550068189.180.145.1192.168.2.4
                              Jan 14, 2025 23:34:44.226289034 CET50069445192.168.2.469.19.119.92
                              Jan 14, 2025 23:34:44.231344938 CET4455006969.19.119.92192.168.2.4
                              Jan 14, 2025 23:34:44.231460094 CET50069445192.168.2.469.19.119.92
                              Jan 14, 2025 23:34:44.231504917 CET50069445192.168.2.469.19.119.92
                              Jan 14, 2025 23:34:44.231623888 CET50070445192.168.2.469.19.119.1
                              Jan 14, 2025 23:34:44.236386061 CET4455007069.19.119.1192.168.2.4
                              Jan 14, 2025 23:34:44.236475945 CET50070445192.168.2.469.19.119.1
                              Jan 14, 2025 23:34:44.236496925 CET4455006969.19.119.92192.168.2.4
                              Jan 14, 2025 23:34:44.236546993 CET50070445192.168.2.469.19.119.1
                              Jan 14, 2025 23:34:44.236546993 CET50069445192.168.2.469.19.119.92
                              Jan 14, 2025 23:34:44.236805916 CET50071445192.168.2.469.19.119.1
                              Jan 14, 2025 23:34:44.241559029 CET4455007069.19.119.1192.168.2.4
                              Jan 14, 2025 23:34:44.241600990 CET4455007169.19.119.1192.168.2.4
                              Jan 14, 2025 23:34:44.241621017 CET50070445192.168.2.469.19.119.1
                              Jan 14, 2025 23:34:44.241652966 CET50071445192.168.2.469.19.119.1
                              Jan 14, 2025 23:34:44.241681099 CET50071445192.168.2.469.19.119.1
                              Jan 14, 2025 23:34:44.246452093 CET4455007169.19.119.1192.168.2.4
                              Jan 14, 2025 23:34:44.686748028 CET4454998414.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:44.686870098 CET49984445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:44.686970949 CET49984445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:44.686970949 CET49984445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:44.691800117 CET4454998414.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:44.691814899 CET4454998414.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:45.641092062 CET50072445192.168.2.489.149.92.59
                              Jan 14, 2025 23:34:45.646270037 CET4455007289.149.92.59192.168.2.4
                              Jan 14, 2025 23:34:45.646445036 CET50072445192.168.2.489.149.92.59
                              Jan 14, 2025 23:34:45.646601915 CET50072445192.168.2.489.149.92.59
                              Jan 14, 2025 23:34:45.647492886 CET50073445192.168.2.489.149.92.1
                              Jan 14, 2025 23:34:45.651675940 CET4455007289.149.92.59192.168.2.4
                              Jan 14, 2025 23:34:45.651885986 CET50072445192.168.2.489.149.92.59
                              Jan 14, 2025 23:34:45.652251005 CET4455007389.149.92.1192.168.2.4
                              Jan 14, 2025 23:34:45.652437925 CET50073445192.168.2.489.149.92.1
                              Jan 14, 2025 23:34:45.652437925 CET50073445192.168.2.489.149.92.1
                              Jan 14, 2025 23:34:45.652796030 CET50074445192.168.2.489.149.92.1
                              Jan 14, 2025 23:34:45.657449007 CET4455007389.149.92.1192.168.2.4
                              Jan 14, 2025 23:34:45.657527924 CET50073445192.168.2.489.149.92.1
                              Jan 14, 2025 23:34:45.657689095 CET4455007489.149.92.1192.168.2.4
                              Jan 14, 2025 23:34:45.657754898 CET50074445192.168.2.489.149.92.1
                              Jan 14, 2025 23:34:45.657799006 CET50074445192.168.2.489.149.92.1
                              Jan 14, 2025 23:34:45.662568092 CET4455007489.149.92.1192.168.2.4
                              Jan 14, 2025 23:34:45.671803951 CET50075445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:45.676651001 CET44550075169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:45.676732063 CET50075445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:45.676732063 CET50075445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:34:45.681590080 CET44550075169.213.232.1192.168.2.4
                              Jan 14, 2025 23:34:46.715852976 CET44550007172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:46.715967894 CET50007445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:46.716059923 CET50007445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:46.716059923 CET50007445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:46.720882893 CET44550007172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:46.720905066 CET44550007172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:46.968903065 CET50076445192.168.2.4163.112.40.156
                              Jan 14, 2025 23:34:46.973798037 CET44550076163.112.40.156192.168.2.4
                              Jan 14, 2025 23:34:46.973922968 CET50076445192.168.2.4163.112.40.156
                              Jan 14, 2025 23:34:46.973922968 CET50076445192.168.2.4163.112.40.156
                              Jan 14, 2025 23:34:46.974061966 CET50077445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:34:46.978908062 CET44550077163.112.40.1192.168.2.4
                              Jan 14, 2025 23:34:46.978923082 CET44550076163.112.40.156192.168.2.4
                              Jan 14, 2025 23:34:46.978969097 CET50077445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:34:46.978986025 CET50077445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:34:46.979001045 CET50076445192.168.2.4163.112.40.156
                              Jan 14, 2025 23:34:46.979263067 CET50078445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:34:46.983937979 CET44550077163.112.40.1192.168.2.4
                              Jan 14, 2025 23:34:46.984004974 CET50077445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:34:46.984040976 CET44550078163.112.40.1192.168.2.4
                              Jan 14, 2025 23:34:46.984092951 CET50078445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:34:46.984150887 CET50078445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:34:46.988887072 CET44550078163.112.40.1192.168.2.4
                              Jan 14, 2025 23:34:47.687346935 CET50079445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:47.692372084 CET4455007914.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:47.692720890 CET50079445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:47.692831039 CET50079445192.168.2.414.17.157.1
                              Jan 14, 2025 23:34:47.697751999 CET4455007914.17.157.1192.168.2.4
                              Jan 14, 2025 23:34:48.203239918 CET50080445192.168.2.4124.142.84.217
                              Jan 14, 2025 23:34:48.208184004 CET44550080124.142.84.217192.168.2.4
                              Jan 14, 2025 23:34:48.208276033 CET50080445192.168.2.4124.142.84.217
                              Jan 14, 2025 23:34:48.208292961 CET50080445192.168.2.4124.142.84.217
                              Jan 14, 2025 23:34:48.208405972 CET50081445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:34:48.213242054 CET44550081124.142.84.1192.168.2.4
                              Jan 14, 2025 23:34:48.213318110 CET50081445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:34:48.213318110 CET50081445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:34:48.213362932 CET44550080124.142.84.217192.168.2.4
                              Jan 14, 2025 23:34:48.213421106 CET50080445192.168.2.4124.142.84.217
                              Jan 14, 2025 23:34:48.213567972 CET50082445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:34:48.218405962 CET44550082124.142.84.1192.168.2.4
                              Jan 14, 2025 23:34:48.218478918 CET50082445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:34:48.218501091 CET44550081124.142.84.1192.168.2.4
                              Jan 14, 2025 23:34:48.218508959 CET50082445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:34:48.218558073 CET50081445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:34:48.223422050 CET44550082124.142.84.1192.168.2.4
                              Jan 14, 2025 23:34:48.716089964 CET44550031208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:48.716201067 CET50031445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:48.722657919 CET50031445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:48.722701073 CET50031445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:48.727534056 CET44550031208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:48.727564096 CET44550031208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:49.185081959 CET4455003681.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:49.185370922 CET50036445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:49.185372114 CET50036445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:49.185372114 CET50036445192.168.2.481.189.170.1
                              Jan 14, 2025 23:34:49.190293074 CET4455003681.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:49.190361977 CET4455003681.189.170.1192.168.2.4
                              Jan 14, 2025 23:34:49.250030994 CET50083445192.168.2.481.189.170.2
                              Jan 14, 2025 23:34:49.254889011 CET4455008381.189.170.2192.168.2.4
                              Jan 14, 2025 23:34:49.254955053 CET50083445192.168.2.481.189.170.2
                              Jan 14, 2025 23:34:49.255028963 CET50083445192.168.2.481.189.170.2
                              Jan 14, 2025 23:34:49.255413055 CET50084445192.168.2.481.189.170.2
                              Jan 14, 2025 23:34:49.260065079 CET4455008381.189.170.2192.168.2.4
                              Jan 14, 2025 23:34:49.260122061 CET50083445192.168.2.481.189.170.2
                              Jan 14, 2025 23:34:49.260209084 CET4455008481.189.170.2192.168.2.4
                              Jan 14, 2025 23:34:49.260274887 CET50084445192.168.2.481.189.170.2
                              Jan 14, 2025 23:34:49.260292053 CET50084445192.168.2.481.189.170.2
                              Jan 14, 2025 23:34:49.265155077 CET4455008481.189.170.2192.168.2.4
                              Jan 14, 2025 23:34:49.359405041 CET50085445192.168.2.434.216.35.57
                              Jan 14, 2025 23:34:49.364370108 CET4455008534.216.35.57192.168.2.4
                              Jan 14, 2025 23:34:49.364433050 CET50085445192.168.2.434.216.35.57
                              Jan 14, 2025 23:34:49.364456892 CET50085445192.168.2.434.216.35.57
                              Jan 14, 2025 23:34:49.364624977 CET50086445192.168.2.434.216.35.1
                              Jan 14, 2025 23:34:49.369369030 CET4455008534.216.35.57192.168.2.4
                              Jan 14, 2025 23:34:49.369472027 CET4455008634.216.35.1192.168.2.4
                              Jan 14, 2025 23:34:49.369472027 CET50085445192.168.2.434.216.35.57
                              Jan 14, 2025 23:34:49.369533062 CET50086445192.168.2.434.216.35.1
                              Jan 14, 2025 23:34:49.369564056 CET50086445192.168.2.434.216.35.1
                              Jan 14, 2025 23:34:49.369782925 CET50087445192.168.2.434.216.35.1
                              Jan 14, 2025 23:34:49.374607086 CET4455008634.216.35.1192.168.2.4
                              Jan 14, 2025 23:34:49.374658108 CET4455008734.216.35.1192.168.2.4
                              Jan 14, 2025 23:34:49.374661922 CET50086445192.168.2.434.216.35.1
                              Jan 14, 2025 23:34:49.374758959 CET50087445192.168.2.434.216.35.1
                              Jan 14, 2025 23:34:49.374821901 CET50087445192.168.2.434.216.35.1
                              Jan 14, 2025 23:34:49.379631042 CET4455008734.216.35.1192.168.2.4
                              Jan 14, 2025 23:34:49.718853951 CET50088445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:49.723823071 CET44550088172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:49.723934889 CET50088445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:49.723957062 CET50088445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:34:49.728797913 CET44550088172.155.89.1192.168.2.4
                              Jan 14, 2025 23:34:50.437705040 CET50089445192.168.2.4108.46.45.97
                              Jan 14, 2025 23:34:50.442622900 CET44550089108.46.45.97192.168.2.4
                              Jan 14, 2025 23:34:50.444907904 CET50089445192.168.2.4108.46.45.97
                              Jan 14, 2025 23:34:50.444948912 CET50089445192.168.2.4108.46.45.97
                              Jan 14, 2025 23:34:50.445064068 CET50090445192.168.2.4108.46.45.1
                              Jan 14, 2025 23:34:50.449976921 CET44550090108.46.45.1192.168.2.4
                              Jan 14, 2025 23:34:50.450009108 CET44550089108.46.45.97192.168.2.4
                              Jan 14, 2025 23:34:50.450087070 CET50090445192.168.2.4108.46.45.1
                              Jan 14, 2025 23:34:50.450088978 CET50089445192.168.2.4108.46.45.97
                              Jan 14, 2025 23:34:50.450356007 CET50091445192.168.2.4108.46.45.1
                              Jan 14, 2025 23:34:50.455073118 CET44550090108.46.45.1192.168.2.4
                              Jan 14, 2025 23:34:50.455208063 CET44550091108.46.45.1192.168.2.4
                              Jan 14, 2025 23:34:50.455286980 CET50090445192.168.2.4108.46.45.1
                              Jan 14, 2025 23:34:50.455319881 CET50091445192.168.2.4108.46.45.1
                              Jan 14, 2025 23:34:50.455337048 CET50091445192.168.2.4108.46.45.1
                              Jan 14, 2025 23:34:50.460119963 CET44550091108.46.45.1192.168.2.4
                              Jan 14, 2025 23:34:50.732340097 CET44550039209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:50.734116077 CET50039445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:50.734210014 CET50039445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:50.734251976 CET50039445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:50.739048958 CET44550039209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:50.739099979 CET44550039209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:50.936747074 CET44550040139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:50.936875105 CET50040445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:50.937017918 CET50040445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:50.937180042 CET50040445192.168.2.4139.228.101.1
                              Jan 14, 2025 23:34:50.941854000 CET44550040139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:50.941982031 CET44550040139.228.101.1192.168.2.4
                              Jan 14, 2025 23:34:51.004260063 CET50092445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:34:51.009428024 CET44550092139.228.101.2192.168.2.4
                              Jan 14, 2025 23:34:51.009512901 CET50092445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:34:51.009608030 CET50092445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:34:51.010010004 CET50093445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:34:51.014571905 CET44550092139.228.101.2192.168.2.4
                              Jan 14, 2025 23:34:51.014638901 CET50092445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:34:51.014933109 CET44550093139.228.101.2192.168.2.4
                              Jan 14, 2025 23:34:51.015003920 CET50093445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:34:51.015050888 CET50093445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:34:51.019828081 CET44550093139.228.101.2192.168.2.4
                              Jan 14, 2025 23:34:51.467744112 CET50094445192.168.2.4103.162.19.244
                              Jan 14, 2025 23:34:51.472731113 CET44550094103.162.19.244192.168.2.4
                              Jan 14, 2025 23:34:51.472820044 CET50094445192.168.2.4103.162.19.244
                              Jan 14, 2025 23:34:51.472884893 CET50094445192.168.2.4103.162.19.244
                              Jan 14, 2025 23:34:51.473000050 CET50095445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:34:51.477880001 CET44550094103.162.19.244192.168.2.4
                              Jan 14, 2025 23:34:51.477910042 CET44550094103.162.19.244192.168.2.4
                              Jan 14, 2025 23:34:51.477941036 CET44550095103.162.19.1192.168.2.4
                              Jan 14, 2025 23:34:51.477967024 CET50094445192.168.2.4103.162.19.244
                              Jan 14, 2025 23:34:51.478004932 CET50095445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:34:51.478111029 CET50095445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:34:51.483108044 CET44550095103.162.19.1192.168.2.4
                              Jan 14, 2025 23:34:51.483217001 CET50095445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:34:51.485610008 CET50096445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:34:51.490509033 CET44550096103.162.19.1192.168.2.4
                              Jan 14, 2025 23:34:51.490572929 CET50096445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:34:51.490614891 CET50096445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:34:51.495573044 CET44550096103.162.19.1192.168.2.4
                              Jan 14, 2025 23:34:51.734535933 CET50097445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:51.739658117 CET44550097208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:51.739758015 CET50097445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:51.739825964 CET50097445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:34:51.744725943 CET44550097208.190.35.1192.168.2.4
                              Jan 14, 2025 23:34:52.406629086 CET50098445192.168.2.4153.73.71.228
                              Jan 14, 2025 23:34:52.411689043 CET44550098153.73.71.228192.168.2.4
                              Jan 14, 2025 23:34:52.411803007 CET50098445192.168.2.4153.73.71.228
                              Jan 14, 2025 23:34:52.411849022 CET50098445192.168.2.4153.73.71.228
                              Jan 14, 2025 23:34:52.412053108 CET50099445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:34:52.416846037 CET44550099153.73.71.1192.168.2.4
                              Jan 14, 2025 23:34:52.416925907 CET50099445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:34:52.416965008 CET50099445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:34:52.417247057 CET50100445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:34:52.417776108 CET44550098153.73.71.228192.168.2.4
                              Jan 14, 2025 23:34:52.418032885 CET44550098153.73.71.228192.168.2.4
                              Jan 14, 2025 23:34:52.418095112 CET50098445192.168.2.4153.73.71.228
                              Jan 14, 2025 23:34:52.421940088 CET44550099153.73.71.1192.168.2.4
                              Jan 14, 2025 23:34:52.422044992 CET50099445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:34:52.422115088 CET44550100153.73.71.1192.168.2.4
                              Jan 14, 2025 23:34:52.422198057 CET50100445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:34:52.422230959 CET50100445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:34:52.427035093 CET44550100153.73.71.1192.168.2.4
                              Jan 14, 2025 23:34:52.811464071 CET44550043153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:52.812421083 CET50043445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:52.812530041 CET50043445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:52.812702894 CET50043445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:52.817409039 CET44550043153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:52.817507982 CET44550043153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:52.935008049 CET4455004481.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:52.935271978 CET50044445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:52.935272932 CET50044445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:52.935425043 CET50044445192.168.2.481.219.229.1
                              Jan 14, 2025 23:34:52.940299034 CET4455004481.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:52.940329075 CET4455004481.219.229.1192.168.2.4
                              Jan 14, 2025 23:34:53.000109911 CET50101445192.168.2.481.219.229.2
                              Jan 14, 2025 23:34:53.004993916 CET4455010181.219.229.2192.168.2.4
                              Jan 14, 2025 23:34:53.005084038 CET50101445192.168.2.481.219.229.2
                              Jan 14, 2025 23:34:53.005140066 CET50101445192.168.2.481.219.229.2
                              Jan 14, 2025 23:34:53.005522966 CET50102445192.168.2.481.219.229.2
                              Jan 14, 2025 23:34:53.010432005 CET4455010181.219.229.2192.168.2.4
                              Jan 14, 2025 23:34:53.010462999 CET4455010281.219.229.2192.168.2.4
                              Jan 14, 2025 23:34:53.010503054 CET50101445192.168.2.481.219.229.2
                              Jan 14, 2025 23:34:53.010551929 CET50102445192.168.2.481.219.229.2
                              Jan 14, 2025 23:34:53.010601997 CET50102445192.168.2.481.219.229.2
                              Jan 14, 2025 23:34:53.015453100 CET4455010281.219.229.2192.168.2.4
                              Jan 14, 2025 23:34:53.281563044 CET50103445192.168.2.4132.223.93.133
                              Jan 14, 2025 23:34:53.286730051 CET44550103132.223.93.133192.168.2.4
                              Jan 14, 2025 23:34:53.286801100 CET50103445192.168.2.4132.223.93.133
                              Jan 14, 2025 23:34:53.286916971 CET50103445192.168.2.4132.223.93.133
                              Jan 14, 2025 23:34:53.287082911 CET50104445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:34:53.292447090 CET44550103132.223.93.133192.168.2.4
                              Jan 14, 2025 23:34:53.292476892 CET44550104132.223.93.1192.168.2.4
                              Jan 14, 2025 23:34:53.292510033 CET50103445192.168.2.4132.223.93.133
                              Jan 14, 2025 23:34:53.292561054 CET50104445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:34:53.292623043 CET50104445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:34:53.292870045 CET50105445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:34:53.297517061 CET44550104132.223.93.1192.168.2.4
                              Jan 14, 2025 23:34:53.297565937 CET50104445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:34:53.297668934 CET44550105132.223.93.1192.168.2.4
                              Jan 14, 2025 23:34:53.297725916 CET50105445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:34:53.297744036 CET50105445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:34:53.304282904 CET44550105132.223.93.1192.168.2.4
                              Jan 14, 2025 23:34:53.750072002 CET50106445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:53.754959106 CET44550106209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:53.755053997 CET50106445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:53.755079031 CET50106445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:34:53.759932995 CET44550106209.26.176.1192.168.2.4
                              Jan 14, 2025 23:34:54.109932899 CET50107445192.168.2.413.242.251.13
                              Jan 14, 2025 23:34:54.114790916 CET4455010713.242.251.13192.168.2.4
                              Jan 14, 2025 23:34:54.114891052 CET50107445192.168.2.413.242.251.13
                              Jan 14, 2025 23:34:54.114924908 CET50107445192.168.2.413.242.251.13
                              Jan 14, 2025 23:34:54.115042925 CET50108445192.168.2.413.242.251.1
                              Jan 14, 2025 23:34:54.119882107 CET4455010813.242.251.1192.168.2.4
                              Jan 14, 2025 23:34:54.119936943 CET4455010713.242.251.13192.168.2.4
                              Jan 14, 2025 23:34:54.119961023 CET50108445192.168.2.413.242.251.1
                              Jan 14, 2025 23:34:54.119991064 CET50107445192.168.2.413.242.251.13
                              Jan 14, 2025 23:34:54.120085001 CET50108445192.168.2.413.242.251.1
                              Jan 14, 2025 23:34:54.120508909 CET50109445192.168.2.413.242.251.1
                              Jan 14, 2025 23:34:54.125036001 CET4455010813.242.251.1192.168.2.4
                              Jan 14, 2025 23:34:54.125109911 CET50108445192.168.2.413.242.251.1
                              Jan 14, 2025 23:34:54.125389099 CET4455010913.242.251.1192.168.2.4
                              Jan 14, 2025 23:34:54.125469923 CET50109445192.168.2.413.242.251.1
                              Jan 14, 2025 23:34:54.125514984 CET50109445192.168.2.413.242.251.1
                              Jan 14, 2025 23:34:54.130328894 CET4455010913.242.251.1192.168.2.4
                              Jan 14, 2025 23:34:54.768978119 CET44550047131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:54.769089937 CET50047445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:54.769170046 CET50047445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:54.769256115 CET50047445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:54.773964882 CET44550047131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:54.774017096 CET44550047131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:54.875329018 CET50110445192.168.2.4155.95.205.88
                              Jan 14, 2025 23:34:54.880465031 CET44550110155.95.205.88192.168.2.4
                              Jan 14, 2025 23:34:54.880563974 CET50110445192.168.2.4155.95.205.88
                              Jan 14, 2025 23:34:54.880631924 CET50110445192.168.2.4155.95.205.88
                              Jan 14, 2025 23:34:54.880790949 CET50111445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:34:54.885636091 CET44550111155.95.205.1192.168.2.4
                              Jan 14, 2025 23:34:54.885704994 CET50111445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:34:54.885735035 CET50111445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:34:54.885781050 CET44550110155.95.205.88192.168.2.4
                              Jan 14, 2025 23:34:54.885852098 CET50110445192.168.2.4155.95.205.88
                              Jan 14, 2025 23:34:54.886095047 CET50112445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:34:54.890753031 CET44550111155.95.205.1192.168.2.4
                              Jan 14, 2025 23:34:54.890804052 CET50111445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:34:54.890858889 CET44550112155.95.205.1192.168.2.4
                              Jan 14, 2025 23:34:54.890925884 CET50112445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:34:54.890980005 CET50112445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:34:54.895761013 CET44550112155.95.205.1192.168.2.4
                              Jan 14, 2025 23:34:55.811937094 CET44550048164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:55.812078953 CET50048445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:55.812223911 CET50048445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:55.812290907 CET50048445192.168.2.4164.225.163.1
                              Jan 14, 2025 23:34:55.817042112 CET44550048164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:55.817070007 CET44550048164.225.163.1192.168.2.4
                              Jan 14, 2025 23:34:55.828084946 CET50115445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:55.833029985 CET44550115153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:55.833112955 CET50115445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:55.833173037 CET50115445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:34:55.837989092 CET44550115153.24.211.1192.168.2.4
                              Jan 14, 2025 23:34:55.875253916 CET50116445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:34:55.880202055 CET44550116164.225.163.2192.168.2.4
                              Jan 14, 2025 23:34:55.880284071 CET50116445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:34:55.880322933 CET50116445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:34:55.880656958 CET50117445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:34:55.885305882 CET44550116164.225.163.2192.168.2.4
                              Jan 14, 2025 23:34:55.885396004 CET50116445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:34:55.885473967 CET44550117164.225.163.2192.168.2.4
                              Jan 14, 2025 23:34:55.885546923 CET50117445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:34:55.885636091 CET50117445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:34:55.890474081 CET44550117164.225.163.2192.168.2.4
                              Jan 14, 2025 23:34:57.590955019 CET44550050136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:57.591064930 CET50050445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:57.591134071 CET50050445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:57.591207981 CET50050445192.168.2.4136.149.42.1
                              Jan 14, 2025 23:34:57.591236115 CET4455005238.1.235.1192.168.2.4
                              Jan 14, 2025 23:34:57.591383934 CET50052445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:57.591383934 CET50052445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:57.591443062 CET50052445192.168.2.438.1.235.1
                              Jan 14, 2025 23:34:57.596005917 CET44550050136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:57.596019030 CET44550050136.149.42.1192.168.2.4
                              Jan 14, 2025 23:34:57.596333027 CET4455005238.1.235.1192.168.2.4
                              Jan 14, 2025 23:34:57.596357107 CET4455005238.1.235.1192.168.2.4
                              Jan 14, 2025 23:34:57.656498909 CET50129445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:34:57.661302090 CET44550129136.149.42.2192.168.2.4
                              Jan 14, 2025 23:34:57.661372900 CET50129445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:34:57.661402941 CET50129445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:34:57.661715984 CET50130445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:34:57.666270971 CET44550129136.149.42.2192.168.2.4
                              Jan 14, 2025 23:34:57.666330099 CET50129445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:34:57.666604042 CET44550130136.149.42.2192.168.2.4
                              Jan 14, 2025 23:34:57.666668892 CET50130445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:34:57.666682005 CET50130445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:34:57.672110081 CET44550130136.149.42.2192.168.2.4
                              Jan 14, 2025 23:34:57.781174898 CET50131445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:57.786031008 CET44550131131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:57.787410021 CET50131445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:57.787604094 CET50131445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:34:57.792556047 CET44550131131.220.220.1192.168.2.4
                              Jan 14, 2025 23:34:58.951299906 CET44550055213.254.242.1192.168.2.4
                              Jan 14, 2025 23:34:58.951390028 CET50055445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:58.951410055 CET50055445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:58.951452971 CET50055445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:34:58.956255913 CET44550055213.254.242.1192.168.2.4
                              Jan 14, 2025 23:34:58.956269979 CET44550055213.254.242.1192.168.2.4
                              Jan 14, 2025 23:34:58.999165058 CET445500562.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:58.999382019 CET50056445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:58.999382019 CET50056445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:58.999382973 CET50056445192.168.2.42.107.176.1
                              Jan 14, 2025 23:34:59.004259109 CET445500562.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:59.004271984 CET445500562.107.176.1192.168.2.4
                              Jan 14, 2025 23:34:59.062498093 CET50150445192.168.2.42.107.176.2
                              Jan 14, 2025 23:34:59.067339897 CET445501502.107.176.2192.168.2.4
                              Jan 14, 2025 23:34:59.067504883 CET50150445192.168.2.42.107.176.2
                              Jan 14, 2025 23:34:59.067504883 CET50150445192.168.2.42.107.176.2
                              Jan 14, 2025 23:34:59.067714930 CET50151445192.168.2.42.107.176.2
                              Jan 14, 2025 23:34:59.072627068 CET445501502.107.176.2192.168.2.4
                              Jan 14, 2025 23:34:59.072640896 CET445501512.107.176.2192.168.2.4
                              Jan 14, 2025 23:34:59.072690010 CET50150445192.168.2.42.107.176.2
                              Jan 14, 2025 23:34:59.072756052 CET50151445192.168.2.42.107.176.2
                              Jan 14, 2025 23:34:59.072801113 CET50151445192.168.2.42.107.176.2
                              Jan 14, 2025 23:34:59.077651978 CET445501512.107.176.2192.168.2.4
                              Jan 14, 2025 23:35:00.593718052 CET50175445192.168.2.438.1.235.1
                              Jan 14, 2025 23:35:00.600528955 CET4455017538.1.235.1192.168.2.4
                              Jan 14, 2025 23:35:00.600590944 CET50175445192.168.2.438.1.235.1
                              Jan 14, 2025 23:35:00.600606918 CET50175445192.168.2.438.1.235.1
                              Jan 14, 2025 23:35:00.607434988 CET4455017538.1.235.1192.168.2.4
                              Jan 14, 2025 23:35:00.686384916 CET44550059136.228.53.1192.168.2.4
                              Jan 14, 2025 23:35:00.686471939 CET50059445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:35:00.686511040 CET50059445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:35:00.686558962 CET50059445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:35:00.693219900 CET44550059136.228.53.1192.168.2.4
                              Jan 14, 2025 23:35:00.693352938 CET44550059136.228.53.1192.168.2.4
                              Jan 14, 2025 23:35:00.969999075 CET44550060168.32.110.1192.168.2.4
                              Jan 14, 2025 23:35:00.970078945 CET50060445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:35:00.970143080 CET50060445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:35:00.970143080 CET50060445192.168.2.4168.32.110.1
                              Jan 14, 2025 23:35:00.974997044 CET44550060168.32.110.1192.168.2.4
                              Jan 14, 2025 23:35:00.975011110 CET44550060168.32.110.1192.168.2.4
                              Jan 14, 2025 23:35:01.031219959 CET50182445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:01.036135912 CET44550182168.32.110.2192.168.2.4
                              Jan 14, 2025 23:35:01.036202908 CET50182445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:01.036346912 CET50182445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:01.037240028 CET50183445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:01.041161060 CET44550182168.32.110.2192.168.2.4
                              Jan 14, 2025 23:35:01.041222095 CET50182445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:01.042011023 CET44550183168.32.110.2192.168.2.4
                              Jan 14, 2025 23:35:01.042093039 CET50183445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:01.042093039 CET50183445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:01.046925068 CET44550183168.32.110.2192.168.2.4
                              Jan 14, 2025 23:35:01.953197956 CET50202445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:35:01.957989931 CET44550202213.254.242.1192.168.2.4
                              Jan 14, 2025 23:35:01.958064079 CET50202445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:35:01.958127975 CET50202445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:35:01.966303110 CET44550202213.254.242.1192.168.2.4
                              Jan 14, 2025 23:35:02.485743999 CET4455006378.77.111.1192.168.2.4
                              Jan 14, 2025 23:35:02.487173080 CET50063445192.168.2.478.77.111.1
                              Jan 14, 2025 23:35:02.487173080 CET50063445192.168.2.478.77.111.1
                              Jan 14, 2025 23:35:02.487270117 CET50063445192.168.2.478.77.111.1
                              Jan 14, 2025 23:35:02.492170095 CET4455006378.77.111.1192.168.2.4
                              Jan 14, 2025 23:35:02.492182970 CET4455006378.77.111.1192.168.2.4
                              Jan 14, 2025 23:35:03.013118029 CET445500648.7.204.1192.168.2.4
                              Jan 14, 2025 23:35:03.013220072 CET50064445192.168.2.48.7.204.1
                              Jan 14, 2025 23:35:03.020091057 CET50064445192.168.2.48.7.204.1
                              Jan 14, 2025 23:35:03.020138025 CET50064445192.168.2.48.7.204.1
                              Jan 14, 2025 23:35:03.024985075 CET445500648.7.204.1192.168.2.4
                              Jan 14, 2025 23:35:03.024998903 CET445500648.7.204.1192.168.2.4
                              Jan 14, 2025 23:35:03.165047884 CET50230445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:03.169887066 CET445502308.7.204.2192.168.2.4
                              Jan 14, 2025 23:35:03.169959068 CET50230445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:03.170044899 CET50230445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:03.170346022 CET50232445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:03.174985886 CET445502308.7.204.2192.168.2.4
                              Jan 14, 2025 23:35:03.175045967 CET50230445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:03.175309896 CET445502328.7.204.2192.168.2.4
                              Jan 14, 2025 23:35:03.175396919 CET50232445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:03.175473928 CET50232445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:03.180197954 CET445502328.7.204.2192.168.2.4
                              Jan 14, 2025 23:35:03.690246105 CET50248445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:35:03.695241928 CET44550248136.228.53.1192.168.2.4
                              Jan 14, 2025 23:35:03.695332050 CET50248445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:35:03.695383072 CET50248445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:35:03.700170994 CET44550248136.228.53.1192.168.2.4
                              Jan 14, 2025 23:35:04.092925072 CET44550067178.89.3.1192.168.2.4
                              Jan 14, 2025 23:35:04.093044996 CET50067445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:35:04.093107939 CET50067445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:35:04.093108892 CET50067445192.168.2.4178.89.3.1
                              Jan 14, 2025 23:35:04.097866058 CET44550067178.89.3.1192.168.2.4
                              Jan 14, 2025 23:35:04.097929955 CET44550067178.89.3.1192.168.2.4
                              Jan 14, 2025 23:35:05.032686949 CET44550068189.180.145.1192.168.2.4
                              Jan 14, 2025 23:35:05.032737970 CET50068445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:35:05.032766104 CET50068445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:35:05.032787085 CET50068445192.168.2.4189.180.145.1
                              Jan 14, 2025 23:35:05.037545919 CET44550068189.180.145.1192.168.2.4
                              Jan 14, 2025 23:35:05.037560940 CET44550068189.180.145.1192.168.2.4
                              Jan 14, 2025 23:35:05.093909025 CET50298445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:05.098757029 CET44550298189.180.145.2192.168.2.4
                              Jan 14, 2025 23:35:05.098860025 CET50298445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:05.098922968 CET50298445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:05.099302053 CET50299445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:05.104048014 CET44550298189.180.145.2192.168.2.4
                              Jan 14, 2025 23:35:05.104104042 CET50298445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:05.104140043 CET44550299189.180.145.2192.168.2.4
                              Jan 14, 2025 23:35:05.104203939 CET50299445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:05.104247093 CET50299445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:05.109030962 CET44550299189.180.145.2192.168.2.4
                              Jan 14, 2025 23:35:05.500031948 CET50318445192.168.2.478.77.111.1
                              Jan 14, 2025 23:35:05.504949093 CET4455031878.77.111.1192.168.2.4
                              Jan 14, 2025 23:35:05.505023003 CET50318445192.168.2.478.77.111.1
                              Jan 14, 2025 23:35:05.505079985 CET50318445192.168.2.478.77.111.1
                              Jan 14, 2025 23:35:05.509876966 CET4455031878.77.111.1192.168.2.4
                              Jan 14, 2025 23:35:05.626421928 CET4455007169.19.119.1192.168.2.4
                              Jan 14, 2025 23:35:05.626485109 CET50071445192.168.2.469.19.119.1
                              Jan 14, 2025 23:35:05.626517057 CET50071445192.168.2.469.19.119.1
                              Jan 14, 2025 23:35:05.626552105 CET50071445192.168.2.469.19.119.1
                              Jan 14, 2025 23:35:05.631328106 CET4455007169.19.119.1192.168.2.4
                              Jan 14, 2025 23:35:05.631340981 CET4455007169.19.119.1192.168.2.4
                              Jan 14, 2025 23:35:07.028837919 CET44550075169.213.232.1192.168.2.4
                              Jan 14, 2025 23:35:07.028954029 CET50075445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:35:07.075748920 CET4455007489.149.92.1192.168.2.4
                              Jan 14, 2025 23:35:07.075918913 CET50074445192.168.2.489.149.92.1
                              Jan 14, 2025 23:35:07.453610897 CET50105445192.168.2.4132.223.93.1
                              Jan 14, 2025 23:35:07.453650951 CET50130445192.168.2.4136.149.42.2
                              Jan 14, 2025 23:35:07.453687906 CET50151445192.168.2.42.107.176.2
                              Jan 14, 2025 23:35:07.453715086 CET50079445192.168.2.414.17.157.1
                              Jan 14, 2025 23:35:07.453803062 CET50074445192.168.2.489.149.92.1
                              Jan 14, 2025 23:35:07.453814030 CET50093445192.168.2.4139.228.101.2
                              Jan 14, 2025 23:35:07.453818083 CET50075445192.168.2.4169.213.232.1
                              Jan 14, 2025 23:35:07.453826904 CET50078445192.168.2.4163.112.40.1
                              Jan 14, 2025 23:35:07.453866005 CET50082445192.168.2.4124.142.84.1
                              Jan 14, 2025 23:35:07.453875065 CET50084445192.168.2.481.189.170.2
                              Jan 14, 2025 23:35:07.453917980 CET50088445192.168.2.4172.155.89.1
                              Jan 14, 2025 23:35:07.453941107 CET50091445192.168.2.4108.46.45.1
                              Jan 14, 2025 23:35:07.453994989 CET50097445192.168.2.4208.190.35.1
                              Jan 14, 2025 23:35:07.454010963 CET50131445192.168.2.4131.220.220.1
                              Jan 14, 2025 23:35:07.454096079 CET50087445192.168.2.434.216.35.1
                              Jan 14, 2025 23:35:07.454096079 CET50096445192.168.2.4103.162.19.1
                              Jan 14, 2025 23:35:07.454106092 CET50100445192.168.2.4153.73.71.1
                              Jan 14, 2025 23:35:07.454108000 CET50102445192.168.2.481.219.229.2
                              Jan 14, 2025 23:35:07.454128027 CET50106445192.168.2.4209.26.176.1
                              Jan 14, 2025 23:35:07.454152107 CET50109445192.168.2.413.242.251.1
                              Jan 14, 2025 23:35:07.454171896 CET50112445192.168.2.4155.95.205.1
                              Jan 14, 2025 23:35:07.454201937 CET50115445192.168.2.4153.24.211.1
                              Jan 14, 2025 23:35:07.454271078 CET50183445192.168.2.4168.32.110.2
                              Jan 14, 2025 23:35:07.454294920 CET50117445192.168.2.4164.225.163.2
                              Jan 14, 2025 23:35:07.454294920 CET50175445192.168.2.438.1.235.1
                              Jan 14, 2025 23:35:07.454294920 CET50202445192.168.2.4213.254.242.1
                              Jan 14, 2025 23:35:07.454330921 CET50248445192.168.2.4136.228.53.1
                              Jan 14, 2025 23:35:07.454340935 CET50232445192.168.2.48.7.204.2
                              Jan 14, 2025 23:35:07.454524994 CET50299445192.168.2.4189.180.145.2
                              Jan 14, 2025 23:35:07.454579115 CET50318445192.168.2.478.77.111.1
                              Jan 14, 2025 23:35:08.828126907 CET4972480192.168.2.4199.232.210.172
                              Jan 14, 2025 23:35:08.833602905 CET8049724199.232.210.172192.168.2.4
                              Jan 14, 2025 23:35:08.835206032 CET4972480192.168.2.4199.232.210.172
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 23:34:01.664159060 CET5867453192.168.2.41.1.1.1
                              Jan 14, 2025 23:34:01.672184944 CET53586741.1.1.1192.168.2.4
                              Jan 14, 2025 23:34:20.333659887 CET138138192.168.2.4192.168.2.255
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 14, 2025 23:34:01.664159060 CET192.168.2.41.1.1.10x5f1dStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 14, 2025 23:34:01.672184944 CET1.1.1.1192.168.2.40x5f1dNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                              Jan 14, 2025 23:34:01.672184944 CET1.1.1.1192.168.2.40x5f1dNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                              Jan 14, 2025 23:34:17.768918991 CET1.1.1.1192.168.2.40x3989No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                              Jan 14, 2025 23:34:17.768918991 CET1.1.1.1192.168.2.40x3989No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                              • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449730104.16.167.228803368C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 23:34:01.683470964 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 23:34:02.184608936 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 22:34:02 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 9021175319095e61-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.449731104.16.167.228804908C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 23:34:02.387480021 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 23:34:02.865403891 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 22:34:02 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 902117577f731851-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.449748104.16.167.228803272C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 23:34:04.380773067 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 23:34:04.878694057 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 22:34:04 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90211763f8080f74-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:17:34:00
                              Start date:14/01/2025
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll"
                              Imagebase:0xce0000
                              File size:126'464 bytes
                              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:1
                              Start time:17:34:00
                              Start date:14/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:17:34:00
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:17:34:00
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\v9xYj92wR3.dll,PlayGame
                              Imagebase:0x860000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:17:34:00
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",#1
                              Imagebase:0x860000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:17:34:00
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:5EEBE844531D50A5D01DBA3FBD3D50C5
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1697558652.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1717433655.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1697696740.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1697696740.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 96%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:6
                              Start time:17:34:01
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe -m security
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:5EEBE844531D50A5D01DBA3FBD3D50C5
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1705199542.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2350091304.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2351017544.0000000001D8D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2351017544.0000000001D8D000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2351305743.00000000022B3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2351305743.00000000022B3000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1705364861.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1705364861.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:17:34:02
                              Start date:14/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:02DE29EEA7BD9C1B72072E6D56972D02
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1716453373.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 97%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:8
                              Start time:17:34:03
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\v9xYj92wR3.dll",PlayGame
                              Imagebase:0x4e0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:9
                              Start time:17:34:03
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:5EEBE844531D50A5D01DBA3FBD3D50C5
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1733476835.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1725055995.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1733619842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1733619842.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1725185746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1725185746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:10
                              Start time:17:34:04
                              Start date:14/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:02DE29EEA7BD9C1B72072E6D56972D02
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1733066298.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1732617381.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:71.7%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:63.2%
                                Total number of Nodes:38
                                Total number of Limit Nodes:9
                                execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                • CreateProcessA.KERNELBASE ref: 00407EE8
                                • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1717391081.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1717372103.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717414663.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717487982.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4281112323-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1717391081.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1717372103.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717414663.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717487982.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000005.00000002.1717391081.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1717372103.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717414663.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717487982.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1717391081.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1717372103.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717414663.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717487982.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1717391081.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1717372103.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717414663.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717433655.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717487982.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1717582328.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Execution Graph

                                Execution Coverage:34.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:36
                                Total number of Limit Nodes:2

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2350030685.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2350017470.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350044630.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350091304.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350104154.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350116724.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000006.00000002.2350030685.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2350017470.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350044630.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350091304.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350104154.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350116724.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2350030685.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2350017470.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350044630.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350091304.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350104154.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350116724.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2350030685.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2350017470.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350044630.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350091304.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350104154.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350116724.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4072214828-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000006.00000002.2350030685.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2350017470.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350044630.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350057421.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350091304.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350104154.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350116724.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2350191976.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                APIs
                                • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID: /../$/..\$\../$\..\
                                • API String ID: 3510742995-3885502717
                                • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                • API String ID: 2238633743-2459060434
                                • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$ManagerStart
                                • String ID: cmd.exe /c "%s"
                                • API String ID: 1485051382-955883872
                                • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow$memcpy
                                • String ID:
                                • API String ID: 1881450474-3916222277
                                • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                • String ID: WANACRY!
                                • API String ID: 283026544-1240840912
                                • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID: $Q;@
                                • API String ID: 2382887404-262343263
                                • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-3916222277
                                • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                APIs
                                • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$FreeProcessfree
                                • String ID:
                                • API String ID: 3428986607-0
                                • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                APIs
                                • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ContextCryptRelease
                                • String ID:
                                • API String ID: 829835001-0
                                • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                APIs
                                  • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                • API String ID: 2238633743-1294736154
                                • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: %s%s$%s%s%s$:$\
                                • API String ID: 0-1100577047
                                • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                APIs
                                • __p___argv.MSVCRT(0040F538), ref: 00402040
                                • strcmp.MSVCRT(?), ref: 0040204B
                                • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                  • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                  • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                  • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                  • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                  • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                • API String ID: 1074704982-2844324180
                                • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                APIs
                                • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                • strlen.MSVCRT(?), ref: 004011A7
                                • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                • String ID: 0@$Software\$WanaCrypt0r
                                • API String ID: 865909632-3421300005
                                • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                • String ID: %s\Intel$%s\ProgramData
                                • API String ID: 3806094219-198707228
                                • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                APIs
                                  • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                  • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                • SetLastError.KERNEL32(0000045A), ref: 00402430
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                • API String ID: 1900561814-3657104962
                                • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                APIs
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                • String ID: %s\%s
                                • API String ID: 1036847564-4073750446
                                • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                APIs
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                • CloseHandle.KERNEL32(?), ref: 004010EC
                                • CloseHandle.KERNEL32(?), ref: 004010F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                • String ID: D
                                • API String ID: 786732093-2746444292
                                • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                APIs
                                • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                • __p__fmode.MSVCRT ref: 004077FC
                                • __p__commode.MSVCRT ref: 0040780A
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                • String ID:
                                • API String ID: 3626615345-0
                                • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                APIs
                                • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                  • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                • String ID:
                                • API String ID: 2141228402-0
                                • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                APIs
                                • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Read$realloc
                                • String ID: ?!@
                                • API String ID: 1241503663-708128716
                                • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: rand$wcslen$ComputerNamesrand
                                • String ID:
                                • API String ID: 3058258771-0
                                • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                APIs
                                • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                • String ID:
                                • API String ID: 2935503933-0
                                • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                APIs
                                • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                • Sleep.KERNEL32(000003E8), ref: 00401F40
                                • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandleMutexOpenSleepsprintf
                                • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                • API String ID: 2780352083-2959021817
                                • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-0
                                • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                APIs
                                • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                • fclose.MSVCRT(00000000), ref: 00401058
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: fclosefopenfreadfwrite
                                • String ID: c.wnry
                                • API String ID: 4000964834-3240288721
                                • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                • String ID:
                                • API String ID: 2811923685-0
                                • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                APIs
                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Pointer$??2@Create
                                • String ID:
                                • API String ID: 1331958074-0
                                • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                APIs
                                • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_stricmp
                                • String ID: P!@
                                • API String ID: 1278613211-1774101457
                                • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                APIs
                                • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFilestrcmp
                                • String ID: c.wnry
                                • API String ID: 3324900478-3240288721
                                • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                APIs
                                • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??3@CloseHandle
                                • String ID: $l@
                                • API String ID: 3816424416-2140230165
                                • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                APIs
                                • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                Memory Dump Source
                                • Source File: 00000007.00000002.1716911926.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1716891744.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716934558.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716954692.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1716975884.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$Leave$Entermemcpy
                                • String ID:
                                • API String ID: 3435569088-0
                                • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65