Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ue5QSYCBPt.dll

Overview

General Information

Sample name:ue5QSYCBPt.dll
renamed because original name is a hash value
Original sample name:5ffdc8b7825f72a04d5c97b6a4d80e7e.dll
Analysis ID:1591535
MD5:5ffdc8b7825f72a04d5c97b6a4d80e7e
SHA1:f1afa3f2455319414ee08d08b95bd9ae9446ac20
SHA256:eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6764 cmdline: loaddll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4404 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5348 cmdline: rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 1396 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1CE39288B0A08B9E9EF9504FEBB99E0C)
          • tasksche.exe (PID: 7116 cmdline: C:\WINDOWS\tasksche.exe /i MD5: B050ED62458D7840747D691F5594009E)
    • rundll32.exe (PID: 4952 cmdline: rundll32.exe C:\Users\user\Desktop\ue5QSYCBPt.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3712 cmdline: rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 2876 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1CE39288B0A08B9E9EF9504FEBB99E0C)
        • tasksche.exe (PID: 6656 cmdline: C:\WINDOWS\tasksche.exe /i MD5: B050ED62458D7840747D691F5594009E)
  • mssecsvc.exe (PID: 5736 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 1CE39288B0A08B9E9EF9504FEBB99E0C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ue5QSYCBPt.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    ue5QSYCBPt.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    ue5QSYCBPt.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000005.00000000.2067776497.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000005.00000000.2067905523.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000005.00000000.2067905523.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            7.2.mssecsvc.exe.1ebc084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            7.2.mssecsvc.exe.23dc8c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            7.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              7.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              7.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:02:03.409266+010020315153Misc activity104.16.167.22880192.168.2.549704TCP
              2025-01-15T03:02:04.094028+010020315153Misc activity104.16.167.22880192.168.2.549705TCP
              2025-01-15T03:02:06.292384+010020315153Misc activity104.16.167.22880192.168.2.549726TCP
              2025-01-15T03:04:09.873064+010020315153Misc activity104.16.167.22880192.168.2.550608TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:02:02.886361+010020242911A Network Trojan was detected192.168.2.5563821.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:02:03.404495+010020242981A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T03:02:04.093915+010020242981A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T03:02:06.292181+010020242981A Network Trojan was detected192.168.2.549726104.16.167.22880TCP
              2025-01-15T03:04:09.867215+010020242981A Network Trojan was detected192.168.2.550608104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:02:03.404495+010020242991A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T03:02:04.093915+010020242991A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T03:02:06.292181+010020242991A Network Trojan was detected192.168.2.549726104.16.167.22880TCP
              2025-01-15T03:04:09.867215+010020242991A Network Trojan was detected192.168.2.550608104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:02:03.404495+010020243011A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T03:02:04.093915+010020243011A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T03:02:06.292181+010020243011A Network Trojan was detected192.168.2.549726104.16.167.22880TCP
              2025-01-15T03:04:09.867215+010020243011A Network Trojan was detected192.168.2.550608104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:02:03.404495+010020243021A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T03:02:04.093915+010020243021A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T03:02:06.292181+010020243021A Network Trojan was detected192.168.2.549726104.16.167.22880TCP
              2025-01-15T03:04:09.867215+010020243021A Network Trojan was detected192.168.2.550608104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T03:02:03.404495+010028033043Unknown Traffic192.168.2.549704104.16.167.22880TCP
              2025-01-15T03:02:04.093915+010028033043Unknown Traffic192.168.2.549705104.16.167.22880TCP
              2025-01-15T03:02:06.292181+010028033043Unknown Traffic192.168.2.549726104.16.167.22880TCP
              2025-01-15T03:04:09.867215+010028033043Unknown Traffic192.168.2.550608104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: ue5QSYCBPt.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 93%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 93%
              Source: ue5QSYCBPt.dllReversingLabs: Detection: 94%
              Source: ue5QSYCBPt.dllVirustotal: Detection: 94%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: ue5QSYCBPt.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 8_2_004018B9 CryptReleaseContext,8_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: ue5QSYCBPt.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49726 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49726 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49726 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49726 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:50608 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:50608 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:50608 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:50608 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:02:03 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022480ad8f242c8-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:02:04 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022480f2c1a182d-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:02:06 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9022481ceb1b8cc0-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 02:04:09 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90224b212c914216-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: unknownNetwork traffic detected: IP country count 11
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.5:56382 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49726 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.5:49726
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.5:49705
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.5:49704
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:50608 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.5:50608
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.138
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.138
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.138
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.1
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.138
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.1
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.1
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.1
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.1
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.1
              Source: unknownTCP traffic detected without corresponding DNS query: 51.1.151.1
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.107
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.107
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.107
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.1
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.107
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.1
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.1
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.1
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.1
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.1
              Source: unknownTCP traffic detected without corresponding DNS query: 87.156.197.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.30
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.30
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.30
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.1
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.30
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.1
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.1
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.1
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.1
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.1
              Source: unknownTCP traffic detected without corresponding DNS query: 202.240.73.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.134
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.134
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.134
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.1
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.134
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.1
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.1
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.1
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.1
              Source: unknownTCP traffic detected without corresponding DNS query: 54.170.200.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: ue5QSYCBPt.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 0000000A.00000002.2106271116.0000000000B38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000005.00000002.2089108308.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/F
              Source: mssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/X
              Source: mssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/h
              Source: mssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/x
              Source: mssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com32H
              Source: mssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comH
              Source: mssecsvc.exe, 00000007.00000002.2718381548.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000005.00000002.2089108308.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comO
              Source: mssecsvc.exe, 00000005.00000002.2089108308.0000000000B67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,memcmp,strrchr,GlobalAlloc,_local_unwind2, WANACRY!8_2_004014A6
              Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,memcmp,strrchr,GlobalAlloc,_local_unwind2, WANACRY!8_2_004014B3
              Source: Yara matchFile source: ue5QSYCBPt.dll, type: SAMPLE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.240e96c.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ecb104.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1eee128.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23eb948.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1eee128.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.240e96c.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23dc8c8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ec70a4.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23eb948.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23e78e8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ecb104.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.2067776497.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.2067905523.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2720112628.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2105613435.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2096475141.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2722276360.0000000001ECB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000000.2075394682.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000000.2075228416.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2722631922.00000000023EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2096661056.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2105778009.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1396, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5736, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 2876, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: ue5QSYCBPt.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: ue5QSYCBPt.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1ebc084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23dc8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.240e96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.240e96c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.240e96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ecb104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ecb104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.1ecb104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1eee128.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1eee128.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1eee128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.23eb948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23eb948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.23eb948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1eee128.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1eee128.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1eee128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.240e96c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.240e96c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.240e96c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.23dc8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23dc8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ec70a4.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ec70a4.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.23eb948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23eb948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.23e78e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23e78e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1ecb104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ecb104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.2067905523.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.2087616134.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.2104619942.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.2105076406.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2722276360.0000000001ECB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000000.2075394682.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2722631922.00000000023EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.2096661056.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.2105778009.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 8_2_00406C408_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 8_2_00402A768_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 8_2_00402E7E8_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 8_2_0040350F8_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 8_2_00404C198_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 8_2_0040541F8_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 8_2_004037978_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 8_2_004043B78_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 8_2_004031BC8_2_004031BC
              Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: ue5QSYCBPt.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: ue5QSYCBPt.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: ue5QSYCBPt.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1ebc084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23dc8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.240e96c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.240e96c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.240e96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ecb104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ecb104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.1ecb104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1eee128.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1eee128.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1eee128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.23eb948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23eb948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.23eb948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1eee128.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1eee128.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1eee128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1ebc084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.240e96c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.240e96c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.240e96c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.23dc8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23dc8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ec70a4.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ec70a4.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.23eb948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23eb948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.23e78e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23e78e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1ecb104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ecb104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.2067905523.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.2087616134.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.2104619942.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.2105076406.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2722276360.0000000001ECB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000000.2075394682.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2722631922.00000000023EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.2096661056.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.2105778009.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000B.00000000.2104619942.000000000040E000.00000008.00000001.01000000.00000007.sdmp, ue5QSYCBPt.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6848:120:WilError_03
              Source: ue5QSYCBPt.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ue5QSYCBPt.dll,PlayGame
              Source: ue5QSYCBPt.dllReversingLabs: Detection: 94%
              Source: ue5QSYCBPt.dllVirustotal: Detection: 94%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ue5QSYCBPt.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ue5QSYCBPt.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: ue5QSYCBPt.dllStatic file information: File size 5267459 > 1048576
              Source: ue5QSYCBPt.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 8_2_00407710 push eax; ret 8_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 8_2_004076C8 push eax; ret 8_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5068Thread sleep count: 94 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5068Thread sleep time: -188000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 1568Thread sleep count: 129 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 1568Thread sleep count: 39 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5068Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000005.00000002.2089108308.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.2089108308.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.2089108308.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.2721611986.0000000000CB9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.2106271116.0000000000B90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
              Source: mssecsvc.exe, 0000000A.00000002.2106271116.0000000000B38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW K
              Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 8_2_004029CC free,GetProcessHeap,HeapFree,8_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591535 Sample: ue5QSYCBPt.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.102 unknown unknown 12->45 47 192.168.2.103 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              ue5QSYCBPt.dll95%ReversingLabsWin32.Ransomware.WannaCry
              ue5QSYCBPt.dll94%VirustotalBrowse
              ue5QSYCBPt.dll100%AviraTR/Ransom.Gen
              ue5QSYCBPt.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com32H0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comO0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comH0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comue5QSYCBPt.dllfalse
                    high
                    https://www.kryptoslogic.commssecsvc.exe, 00000005.00000002.2089108308.0000000000B67000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comOmssecsvc.exe, 00000005.00000002.2089108308.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Xmssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hmssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/xmssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com32Hmssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Fmssecsvc.exe, 00000005.00000002.2089108308.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comHmssecsvc.exe, 00000007.00000002.2721611986.0000000000C68000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000007.00000002.2718381548.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                131.112.24.46
                                unknownJapan9367TITECHTokyoInstituteofTechnologyJPfalse
                                166.146.223.2
                                unknownUnited States
                                6167CELLCO-PARTUSfalse
                                166.146.223.1
                                unknownUnited States
                                6167CELLCO-PARTUSfalse
                                179.222.192.2
                                unknownBrazil
                                28573CLAROSABRfalse
                                179.222.192.1
                                unknownBrazil
                                28573CLAROSABRfalse
                                14.230.102.1
                                unknownViet Nam
                                45899VNPT-AS-VNVNPTCorpVNfalse
                                87.156.197.107
                                unknownGermany
                                3320DTAGInternetserviceprovideroperationsDEfalse
                                54.170.200.1
                                unknownUnited States
                                16509AMAZON-02USfalse
                                54.170.200.2
                                unknownUnited States
                                16509AMAZON-02USfalse
                                59.189.210.8
                                unknownSingapore
                                10091STARHUB-CABLEStarHubLtdSGfalse
                                179.222.192.195
                                unknownBrazil
                                28573CLAROSABRfalse
                                59.189.210.1
                                unknownSingapore
                                10091STARHUB-CABLEStarHubLtdSGfalse
                                59.189.210.2
                                unknownSingapore
                                10091STARHUB-CABLEStarHubLtdSGfalse
                                181.91.195.1
                                unknownArgentina
                                7303TelecomArgentinaSAARfalse
                                201.215.187.1
                                unknownChile
                                22047VTRBANDAANCHASACLfalse
                                24.177.121.1
                                unknownUnited States
                                20115CHARTER-20115USfalse
                                51.1.151.138
                                unknownUnited Kingdom
                                2686ATGS-MMD-ASUSfalse
                                49.6.113.1
                                unknownChina
                                55990HWCSNETHuaweiCloudServicedatacenterCNfalse
                                172.76.144.71
                                unknownUnited States
                                5650FRONTIER-FRTRUSfalse
                                28.93.62.1
                                unknownUnited States
                                7922COMCAST-7922USfalse
                                IP
                                192.168.2.148
                                192.168.2.149
                                192.168.2.146
                                192.168.2.147
                                192.168.2.140
                                192.168.2.141
                                192.168.2.144
                                192.168.2.145
                                192.168.2.142
                                192.168.2.143
                                192.168.2.159
                                192.168.2.157
                                192.168.2.158
                                192.168.2.151
                                192.168.2.152
                                192.168.2.150
                                192.168.2.155
                                192.168.2.156
                                192.168.2.153
                                192.168.2.154
                                192.168.2.126
                                192.168.2.247
                                192.168.2.127
                                192.168.2.248
                                192.168.2.124
                                192.168.2.245
                                192.168.2.125
                                192.168.2.246
                                192.168.2.128
                                192.168.2.249
                                192.168.2.129
                                192.168.2.240
                                192.168.2.122
                                192.168.2.243
                                192.168.2.123
                                192.168.2.244
                                192.168.2.120
                                192.168.2.241
                                192.168.2.121
                                192.168.2.242
                                192.168.2.97
                                192.168.2.137
                                192.168.2.96
                                192.168.2.138
                                192.168.2.99
                                192.168.2.135
                                192.168.2.98
                                192.168.2.136
                                192.168.2.139
                                192.168.2.250
                                192.168.2.130
                                192.168.2.251
                                192.168.2.91
                                192.168.2.90
                                192.168.2.93
                                192.168.2.133
                                192.168.2.254
                                192.168.2.92
                                192.168.2.134
                                192.168.2.95
                                192.168.2.131
                                192.168.2.252
                                192.168.2.94
                                192.168.2.132
                                192.168.2.253
                                192.168.2.104
                                192.168.2.225
                                192.168.2.105
                                192.168.2.226
                                192.168.2.102
                                192.168.2.223
                                192.168.2.103
                                192.168.2.224
                                192.168.2.108
                                192.168.2.229
                                192.168.2.109
                                192.168.2.106
                                192.168.2.227
                                192.168.2.107
                                192.168.2.228
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1591535
                                Start date and time:2025-01-15 03:01:08 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 20s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:14
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:ue5QSYCBPt.dll
                                renamed because original name is a hash value
                                Original Sample Name:5ffdc8b7825f72a04d5c97b6a4d80e7e.dll
                                Detection:MAL
                                Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:Failed
                                Cookbook Comments:
                                • Found application associated with file extension: .dll
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                • Excluded IPs from analysis (whitelisted): 199.232.214.172, 184.30.131.245, 13.107.246.45, 4.175.87.197
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target tasksche.exe, PID 7116 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                21:02:04API Interceptor1x Sleep call for process: loaddll32.exe modified
                                21:02:37API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comxjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                • 104.16.166.228
                                9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                • 104.16.166.228
                                v9xYj92wR3.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CELLCO-PARTUSFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                • 97.211.71.186
                                meth8.elfGet hashmaliciousMiraiBrowse
                                • 97.139.119.107
                                arm4.elfGet hashmaliciousUnknownBrowse
                                • 97.206.130.29
                                spc.elfGet hashmaliciousUnknownBrowse
                                • 97.219.217.53
                                meth9.elfGet hashmaliciousMiraiBrowse
                                • 97.206.206.127
                                sh4.elfGet hashmaliciousUnknownBrowse
                                • 162.115.196.134
                                elitebotnet.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                • 97.248.128.187
                                3.elfGet hashmaliciousUnknownBrowse
                                • 97.217.214.117
                                5.elfGet hashmaliciousUnknownBrowse
                                • 97.181.17.139
                                res.m68k.elfGet hashmaliciousUnknownBrowse
                                • 97.195.224.55
                                CELLCO-PARTUSFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                • 97.211.71.186
                                meth8.elfGet hashmaliciousMiraiBrowse
                                • 97.139.119.107
                                arm4.elfGet hashmaliciousUnknownBrowse
                                • 97.206.130.29
                                spc.elfGet hashmaliciousUnknownBrowse
                                • 97.219.217.53
                                meth9.elfGet hashmaliciousMiraiBrowse
                                • 97.206.206.127
                                sh4.elfGet hashmaliciousUnknownBrowse
                                • 162.115.196.134
                                elitebotnet.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                • 97.248.128.187
                                3.elfGet hashmaliciousUnknownBrowse
                                • 97.217.214.117
                                5.elfGet hashmaliciousUnknownBrowse
                                • 97.181.17.139
                                res.m68k.elfGet hashmaliciousUnknownBrowse
                                • 97.195.224.55
                                TITECHTokyoInstituteofTechnologyJParmv7l.elfGet hashmaliciousMiraiBrowse
                                • 131.112.223.52
                                jew.m68k.elfGet hashmaliciousUnknownBrowse
                                • 131.112.4.160
                                jew.sh4.elfGet hashmaliciousUnknownBrowse
                                • 131.112.241.158
                                la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                • 131.112.144.169
                                yakuza.arm5.elfGet hashmaliciousUnknownBrowse
                                • 131.112.223.29
                                la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                • 131.112.48.116
                                N7Nb3HPK0R.elfGet hashmaliciousUnknownBrowse
                                • 131.112.18.233
                                95.214.27.183-x86-2024-09-02T08_52_28.elfGet hashmaliciousUnknownBrowse
                                • 131.112.241.136
                                sh4.elfGet hashmaliciousMiraiBrowse
                                • 131.112.241.168
                                NsMBSCHqbQ.elfGet hashmaliciousMiraiBrowse
                                • 131.112.105.248
                                No context
                                No context
                                Process:C:\Windows\mssecsvc.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3514368
                                Entropy (8bit):7.2830361946740085
                                Encrypted:false
                                SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdOxJM0H9PAMEcaEau3R8yAH1plAHj:QqPoBhz1aRxcSUwxWa9P593R8yAVp2Hj
                                MD5:B050ED62458D7840747D691F5594009E
                                SHA1:6B2132CE30699CCA6ECE531CDACA483C08E66244
                                SHA-256:8916AAA55996942651AA1AF354CA9D54C9A94870C837B27BA3D83593C8F41467
                                SHA-512:34D56A781CA2600AA8A143B0BA367137D5FD369FD21A7F6F179B7F9F898B9BCBB316FED0DA536FB458671663C323F8BE92736D30B7D714CB25C51D671BC75726
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 93%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\mssecsvc.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3514368
                                Entropy (8bit):7.2830361946740085
                                Encrypted:false
                                SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdOxJM0H9PAMEcaEau3R8yAH1plAHj:QqPoBhz1aRxcSUwxWa9P593R8yAVp2Hj
                                MD5:B050ED62458D7840747D691F5594009E
                                SHA1:6B2132CE30699CCA6ECE531CDACA483C08E66244
                                SHA-256:8916AAA55996942651AA1AF354CA9D54C9A94870C837B27BA3D83593C8F41467
                                SHA-512:34D56A781CA2600AA8A143B0BA367137D5FD369FD21A7F6F179B7F9F898B9BCBB316FED0DA536FB458671663C323F8BE92736D30B7D714CB25C51D671BC75726
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 93%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):5.633510897140927
                                TrID:
                                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                • Generic Win/DOS Executable (2004/3) 0.20%
                                • DOS Executable Generic (2002/1) 0.20%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:ue5QSYCBPt.dll
                                File size:5'267'459 bytes
                                MD5:5ffdc8b7825f72a04d5c97b6a4d80e7e
                                SHA1:f1afa3f2455319414ee08d08b95bd9ae9446ac20
                                SHA256:eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be
                                SHA512:6379e6b624382430b3e50a56781bbbb59cb3dea82850d968b89ff403c32455babcfe03cb627a6fe53aa8cbd98708fdbe151d48f70f2ba731c26c045bb0c08c69
                                SSDEEP:98304:+DqPoBhz1aRxcSUwxWa9P593R8yAVp2H:+DqPe1CxcpadzR8yc4H
                                TLSH:263633A8666CB2BCF0540BB444738D2AB6B73C69B7798E1F57C087A60C0379B6FD4641
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                Icon Hash:7ae282899bbab082
                                Entrypoint:0x100011e9
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x10000000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                DLL Characteristics:
                                Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                Instruction
                                push ebp
                                mov ebp, esp
                                push ebx
                                mov ebx, dword ptr [ebp+08h]
                                push esi
                                mov esi, dword ptr [ebp+0Ch]
                                push edi
                                mov edi, dword ptr [ebp+10h]
                                test esi, esi
                                jne 00007F3DB8DB7EABh
                                cmp dword ptr [10003140h], 00000000h
                                jmp 00007F3DB8DB7EC8h
                                cmp esi, 01h
                                je 00007F3DB8DB7EA7h
                                cmp esi, 02h
                                jne 00007F3DB8DB7EC4h
                                mov eax, dword ptr [10003150h]
                                test eax, eax
                                je 00007F3DB8DB7EABh
                                push edi
                                push esi
                                push ebx
                                call eax
                                test eax, eax
                                je 00007F3DB8DB7EAEh
                                push edi
                                push esi
                                push ebx
                                call 00007F3DB8DB7DBAh
                                test eax, eax
                                jne 00007F3DB8DB7EA6h
                                xor eax, eax
                                jmp 00007F3DB8DB7EF0h
                                push edi
                                push esi
                                push ebx
                                call 00007F3DB8DB7C6Ch
                                cmp esi, 01h
                                mov dword ptr [ebp+0Ch], eax
                                jne 00007F3DB8DB7EAEh
                                test eax, eax
                                jne 00007F3DB8DB7ED9h
                                push edi
                                push eax
                                push ebx
                                call 00007F3DB8DB7D96h
                                test esi, esi
                                je 00007F3DB8DB7EA7h
                                cmp esi, 03h
                                jne 00007F3DB8DB7EC8h
                                push edi
                                push esi
                                push ebx
                                call 00007F3DB8DB7D85h
                                test eax, eax
                                jne 00007F3DB8DB7EA5h
                                and dword ptr [ebp+0Ch], eax
                                cmp dword ptr [ebp+0Ch], 00000000h
                                je 00007F3DB8DB7EB3h
                                mov eax, dword ptr [10003150h]
                                test eax, eax
                                je 00007F3DB8DB7EAAh
                                push edi
                                push esi
                                push ebx
                                call eax
                                mov dword ptr [ebp+0Ch], eax
                                mov eax, dword ptr [ebp+0Ch]
                                pop edi
                                pop esi
                                pop ebx
                                pop ebp
                                retn 000Ch
                                jmp dword ptr [10002028h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                Programming Language:
                                • [ C ] VS98 (6.0) build 8168
                                • [C++] VS98 (6.0) build 8168
                                • [RES] VS98 (6.0) cvtres build 1720
                                • [LNK] VS98 (6.0) imp/exp build 8168
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x40000x5000600x501000cab172adbdde2360890186f8ea7865c2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                W0x40600x500000dataEnglishUnited States0.8770942687988281
                                DLLImport
                                KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                NameOrdinalAddress
                                PlayGame10x10001114
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2025-01-15T03:02:02.886361+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.5563821.1.1.153UDP
                                2025-01-15T03:02:03.404495+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549704104.16.167.22880TCP
                                2025-01-15T03:02:03.404495+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549704104.16.167.22880TCP
                                2025-01-15T03:02:03.404495+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549704104.16.167.22880TCP
                                2025-01-15T03:02:03.404495+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549704104.16.167.22880TCP
                                2025-01-15T03:02:03.404495+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549704104.16.167.22880TCP
                                2025-01-15T03:02:03.409266+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.549704TCP
                                2025-01-15T03:02:04.093915+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549705104.16.167.22880TCP
                                2025-01-15T03:02:04.093915+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549705104.16.167.22880TCP
                                2025-01-15T03:02:04.093915+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549705104.16.167.22880TCP
                                2025-01-15T03:02:04.093915+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549705104.16.167.22880TCP
                                2025-01-15T03:02:04.093915+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549705104.16.167.22880TCP
                                2025-01-15T03:02:04.094028+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.549705TCP
                                2025-01-15T03:02:06.292181+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549726104.16.167.22880TCP
                                2025-01-15T03:02:06.292181+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549726104.16.167.22880TCP
                                2025-01-15T03:02:06.292181+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549726104.16.167.22880TCP
                                2025-01-15T03:02:06.292181+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549726104.16.167.22880TCP
                                2025-01-15T03:02:06.292181+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549726104.16.167.22880TCP
                                2025-01-15T03:02:06.292384+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.549726TCP
                                2025-01-15T03:04:09.867215+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.550608104.16.167.22880TCP
                                2025-01-15T03:04:09.867215+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.550608104.16.167.22880TCP
                                2025-01-15T03:04:09.867215+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.550608104.16.167.22880TCP
                                2025-01-15T03:04:09.867215+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.550608104.16.167.22880TCP
                                2025-01-15T03:04:09.867215+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.550608104.16.167.22880TCP
                                2025-01-15T03:04:09.873064+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.550608TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 15, 2025 03:01:58.852840900 CET49675443192.168.2.523.1.237.91
                                Jan 15, 2025 03:01:58.852863073 CET49674443192.168.2.523.1.237.91
                                Jan 15, 2025 03:01:58.977888107 CET49673443192.168.2.523.1.237.91
                                Jan 15, 2025 03:02:02.924401999 CET4970480192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:02.929243088 CET8049704104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:02.929316044 CET4970480192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:02.929512978 CET4970480192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:02.934258938 CET8049704104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:03.403279066 CET8049704104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:03.404192924 CET8049704104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:03.404495001 CET4970480192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:03.404495001 CET4970480192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:03.409265995 CET8049704104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:03.609117985 CET4970580192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:03.614238977 CET8049705104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:03.614810944 CET4970580192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:03.614990950 CET4970580192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:03.619848967 CET8049705104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:04.093827963 CET8049705104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:04.093914986 CET4970580192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:04.094027996 CET8049705104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:04.094088078 CET4970580192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:04.144908905 CET4970580192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:04.149912119 CET8049705104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:04.180409908 CET49706445192.168.2.559.189.210.8
                                Jan 15, 2025 03:02:04.187052965 CET4454970659.189.210.8192.168.2.5
                                Jan 15, 2025 03:02:04.187180996 CET49706445192.168.2.559.189.210.8
                                Jan 15, 2025 03:02:04.188030958 CET49706445192.168.2.559.189.210.8
                                Jan 15, 2025 03:02:04.188364029 CET49707445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:04.192908049 CET4454970659.189.210.8192.168.2.5
                                Jan 15, 2025 03:02:04.192984104 CET49706445192.168.2.559.189.210.8
                                Jan 15, 2025 03:02:04.193140984 CET4454970759.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:04.193690062 CET49707445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:04.193711042 CET49707445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:04.198663950 CET4454970759.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:04.198733091 CET49707445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:04.207305908 CET49709445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:04.212285042 CET4454970959.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:04.212388992 CET49709445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:04.214179039 CET49709445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:04.219038010 CET4454970959.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:05.799951077 CET4972680192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:05.804846048 CET8049726104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:05.805002928 CET4972680192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:05.805573940 CET4972680192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:05.810384989 CET8049726104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:06.183103085 CET49732445192.168.2.551.1.151.138
                                Jan 15, 2025 03:02:06.188210011 CET4454973251.1.151.138192.168.2.5
                                Jan 15, 2025 03:02:06.188308001 CET49732445192.168.2.551.1.151.138
                                Jan 15, 2025 03:02:06.188503981 CET49732445192.168.2.551.1.151.138
                                Jan 15, 2025 03:02:06.188762903 CET49733445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:06.193329096 CET4454973251.1.151.138192.168.2.5
                                Jan 15, 2025 03:02:06.193397045 CET49732445192.168.2.551.1.151.138
                                Jan 15, 2025 03:02:06.193528891 CET4454973351.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:06.193610907 CET49733445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:06.193722963 CET49733445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:06.195384979 CET49734445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:06.198610067 CET4454973351.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:06.198688984 CET49733445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:06.200213909 CET4454973451.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:06.200303078 CET49734445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:06.200409889 CET49734445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:06.205193043 CET4454973451.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:06.292109013 CET8049726104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:06.292181015 CET4972680192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:06.292326927 CET4972680192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:06.292383909 CET8049726104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:06.292428017 CET4972680192.168.2.5104.16.167.228
                                Jan 15, 2025 03:02:06.297101021 CET8049726104.16.167.228192.168.2.5
                                Jan 15, 2025 03:02:08.198422909 CET49754445192.168.2.587.156.197.107
                                Jan 15, 2025 03:02:08.203388929 CET4454975487.156.197.107192.168.2.5
                                Jan 15, 2025 03:02:08.203478098 CET49754445192.168.2.587.156.197.107
                                Jan 15, 2025 03:02:08.203597069 CET49754445192.168.2.587.156.197.107
                                Jan 15, 2025 03:02:08.203893900 CET49755445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:08.208406925 CET4454975487.156.197.107192.168.2.5
                                Jan 15, 2025 03:02:08.208456039 CET4454975487.156.197.107192.168.2.5
                                Jan 15, 2025 03:02:08.208503962 CET49754445192.168.2.587.156.197.107
                                Jan 15, 2025 03:02:08.208755970 CET4454975587.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:08.208816051 CET49755445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:08.208842039 CET49755445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:08.210053921 CET49756445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:08.213850021 CET4454975587.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:08.213907003 CET49755445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:08.214865923 CET4454975687.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:08.214936018 CET49756445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:08.215025902 CET49756445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:08.219811916 CET4454975687.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:08.462189913 CET49674443192.168.2.523.1.237.91
                                Jan 15, 2025 03:02:08.462423086 CET49675443192.168.2.523.1.237.91
                                Jan 15, 2025 03:02:08.587192059 CET49673443192.168.2.523.1.237.91
                                Jan 15, 2025 03:02:10.214159966 CET49779445192.168.2.5202.240.73.30
                                Jan 15, 2025 03:02:10.219095945 CET44549779202.240.73.30192.168.2.5
                                Jan 15, 2025 03:02:10.219180107 CET49779445192.168.2.5202.240.73.30
                                Jan 15, 2025 03:02:10.219223022 CET49779445192.168.2.5202.240.73.30
                                Jan 15, 2025 03:02:10.219394922 CET49780445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:10.224136114 CET44549779202.240.73.30192.168.2.5
                                Jan 15, 2025 03:02:10.224198103 CET44549780202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:10.224203110 CET49779445192.168.2.5202.240.73.30
                                Jan 15, 2025 03:02:10.224275112 CET49780445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:10.224361897 CET49780445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:10.225528955 CET49781445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:10.229248047 CET44549780202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:10.229314089 CET49780445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:10.230312109 CET44549781202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:10.230379105 CET49781445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:10.230438948 CET49781445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:10.235217094 CET44549781202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:10.236916065 CET4434970323.1.237.91192.168.2.5
                                Jan 15, 2025 03:02:10.237003088 CET49703443192.168.2.523.1.237.91
                                Jan 15, 2025 03:02:12.229450941 CET49803445192.168.2.554.170.200.134
                                Jan 15, 2025 03:02:12.234389067 CET4454980354.170.200.134192.168.2.5
                                Jan 15, 2025 03:02:12.234477043 CET49803445192.168.2.554.170.200.134
                                Jan 15, 2025 03:02:12.234561920 CET49803445192.168.2.554.170.200.134
                                Jan 15, 2025 03:02:12.234805107 CET49804445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:12.239481926 CET4454980354.170.200.134192.168.2.5
                                Jan 15, 2025 03:02:12.239545107 CET49803445192.168.2.554.170.200.134
                                Jan 15, 2025 03:02:12.239573002 CET4454980454.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:12.239617109 CET49804445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:12.239655018 CET49804445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:12.240678072 CET49805445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:12.244607925 CET4454980454.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:12.244673014 CET49804445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:12.245479107 CET4454980554.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:12.245553017 CET49805445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:12.245619059 CET49805445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:12.250334978 CET4454980554.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:14.244777918 CET49828445192.168.2.5138.229.217.125
                                Jan 15, 2025 03:02:14.249712944 CET44549828138.229.217.125192.168.2.5
                                Jan 15, 2025 03:02:14.249864101 CET49828445192.168.2.5138.229.217.125
                                Jan 15, 2025 03:02:14.250036001 CET49828445192.168.2.5138.229.217.125
                                Jan 15, 2025 03:02:14.250420094 CET49829445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:14.254965067 CET44549828138.229.217.125192.168.2.5
                                Jan 15, 2025 03:02:14.255045891 CET49828445192.168.2.5138.229.217.125
                                Jan 15, 2025 03:02:14.255498886 CET44549829138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:14.255549908 CET49829445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:14.255594969 CET49829445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:14.256597996 CET49830445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:14.260515928 CET44549829138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:14.260565042 CET49829445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:14.261511087 CET44549830138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:14.261564970 CET49830445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:14.261805058 CET49830445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:14.266608953 CET44549830138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:16.260009050 CET49853445192.168.2.5166.146.223.120
                                Jan 15, 2025 03:02:16.265197992 CET44549853166.146.223.120192.168.2.5
                                Jan 15, 2025 03:02:16.265310049 CET49853445192.168.2.5166.146.223.120
                                Jan 15, 2025 03:02:16.265337944 CET49853445192.168.2.5166.146.223.120
                                Jan 15, 2025 03:02:16.265489101 CET49854445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:16.270350933 CET44549853166.146.223.120192.168.2.5
                                Jan 15, 2025 03:02:16.270385027 CET44549854166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:16.270423889 CET49853445192.168.2.5166.146.223.120
                                Jan 15, 2025 03:02:16.270467997 CET49854445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:16.270561934 CET49854445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:16.270865917 CET49855445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:16.275450945 CET44549854166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:16.275522947 CET49854445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:16.275763035 CET44549855166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:16.275837898 CET49855445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:16.275887966 CET49855445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:16.280744076 CET44549855166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:18.275333881 CET49885445192.168.2.5179.222.192.195
                                Jan 15, 2025 03:02:18.281547070 CET44549885179.222.192.195192.168.2.5
                                Jan 15, 2025 03:02:18.281718969 CET49885445192.168.2.5179.222.192.195
                                Jan 15, 2025 03:02:18.281718969 CET49885445192.168.2.5179.222.192.195
                                Jan 15, 2025 03:02:18.281888962 CET49886445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:18.286700010 CET44549886179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:18.286711931 CET44549885179.222.192.195192.168.2.5
                                Jan 15, 2025 03:02:18.286798954 CET49886445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:18.286906004 CET49886445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:18.286958933 CET49885445192.168.2.5179.222.192.195
                                Jan 15, 2025 03:02:18.287189960 CET49887445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:18.291663885 CET44549886179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:18.291714907 CET49886445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:18.291933060 CET44549887179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:18.291994095 CET49887445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:18.293319941 CET49887445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:18.299386978 CET44549887179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:20.352186918 CET49920445192.168.2.528.93.62.163
                                Jan 15, 2025 03:02:20.360620975 CET4454992028.93.62.163192.168.2.5
                                Jan 15, 2025 03:02:20.361016035 CET49920445192.168.2.528.93.62.163
                                Jan 15, 2025 03:02:20.362498999 CET49920445192.168.2.528.93.62.163
                                Jan 15, 2025 03:02:20.362663984 CET49921445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:20.370060921 CET4454992128.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:20.370071888 CET4454992028.93.62.163192.168.2.5
                                Jan 15, 2025 03:02:20.370142937 CET49920445192.168.2.528.93.62.163
                                Jan 15, 2025 03:02:20.370158911 CET49921445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:20.372364998 CET49921445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:20.379672050 CET4454992128.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:20.380920887 CET49921445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:20.419534922 CET49923445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:20.424402952 CET4454992328.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:20.424804926 CET49923445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:20.428487062 CET49923445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:20.433273077 CET4454992328.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:22.322778940 CET49958445192.168.2.549.6.113.131
                                Jan 15, 2025 03:02:22.327759027 CET4454995849.6.113.131192.168.2.5
                                Jan 15, 2025 03:02:22.327919960 CET49958445192.168.2.549.6.113.131
                                Jan 15, 2025 03:02:22.327956915 CET49958445192.168.2.549.6.113.131
                                Jan 15, 2025 03:02:22.328125000 CET49959445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:22.332937002 CET4454995949.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:22.333096981 CET4454995849.6.113.131192.168.2.5
                                Jan 15, 2025 03:02:22.333172083 CET49958445192.168.2.549.6.113.131
                                Jan 15, 2025 03:02:22.333183050 CET49959445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:22.333198071 CET49959445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:22.333518982 CET49960445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:22.338171005 CET4454995949.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:22.338263035 CET49959445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:22.338303089 CET4454996049.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:22.338408947 CET49960445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:22.338408947 CET49960445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:22.343178034 CET4454996049.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:24.337766886 CET49993445192.168.2.553.251.246.100
                                Jan 15, 2025 03:02:24.342837095 CET4454999353.251.246.100192.168.2.5
                                Jan 15, 2025 03:02:24.346843958 CET49993445192.168.2.553.251.246.100
                                Jan 15, 2025 03:02:24.346844912 CET49993445192.168.2.553.251.246.100
                                Jan 15, 2025 03:02:24.346950054 CET49994445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:24.351787090 CET4454999453.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:24.351897955 CET4454999353.251.246.100192.168.2.5
                                Jan 15, 2025 03:02:24.351979017 CET49993445192.168.2.553.251.246.100
                                Jan 15, 2025 03:02:24.352277994 CET49994445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:24.352282047 CET49995445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:24.357822895 CET4454999553.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:24.357880116 CET4454999453.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:24.357959032 CET49994445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:24.357983112 CET49995445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:24.357983112 CET49995445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:24.363895893 CET4454999553.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:25.589692116 CET4454970959.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:25.589809895 CET49709445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:25.673348904 CET49709445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:25.673348904 CET49709445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:25.678388119 CET4454970959.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:25.678401947 CET4454970959.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:26.353586912 CET50029445192.168.2.53.41.196.4
                                Jan 15, 2025 03:02:26.412755013 CET445500293.41.196.4192.168.2.5
                                Jan 15, 2025 03:02:26.414365053 CET50029445192.168.2.53.41.196.4
                                Jan 15, 2025 03:02:26.414494038 CET50029445192.168.2.53.41.196.4
                                Jan 15, 2025 03:02:26.414761066 CET50031445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:26.419397116 CET445500293.41.196.4192.168.2.5
                                Jan 15, 2025 03:02:26.419596910 CET445500313.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:26.419657946 CET50029445192.168.2.53.41.196.4
                                Jan 15, 2025 03:02:26.419691086 CET50031445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:26.419756889 CET50031445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:26.420133114 CET50032445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:26.424565077 CET445500313.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:26.424892902 CET445500323.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:26.424958944 CET50031445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:26.424979925 CET50032445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:26.425040007 CET50032445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:26.429789066 CET445500323.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:27.574441910 CET4454973451.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:27.574526072 CET49734445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:27.574599981 CET49734445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:27.574666023 CET49734445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:27.579349041 CET4454973451.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:27.579396963 CET4454973451.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:28.383855104 CET50067445192.168.2.5144.134.14.202
                                Jan 15, 2025 03:02:28.388752937 CET44550067144.134.14.202192.168.2.5
                                Jan 15, 2025 03:02:28.388838053 CET50067445192.168.2.5144.134.14.202
                                Jan 15, 2025 03:02:28.388914108 CET50067445192.168.2.5144.134.14.202
                                Jan 15, 2025 03:02:28.389081001 CET50069445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:28.393939972 CET44550067144.134.14.202192.168.2.5
                                Jan 15, 2025 03:02:28.393956900 CET44550069144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:28.394011021 CET50067445192.168.2.5144.134.14.202
                                Jan 15, 2025 03:02:28.394057035 CET50069445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:28.394257069 CET50069445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:28.394659042 CET50070445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:28.399211884 CET44550069144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:28.399321079 CET50069445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:28.399452925 CET44550070144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:28.399509907 CET50070445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:28.399535894 CET50070445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:28.404287100 CET44550070144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:28.681509018 CET50073445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:28.686363935 CET4455007359.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:28.686470985 CET50073445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:28.689280987 CET50073445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:28.694210052 CET4455007359.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:29.586110115 CET4454975687.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:29.586333036 CET49756445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:29.586333990 CET49756445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:29.586416006 CET49756445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:29.591428995 CET4454975687.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:29.591443062 CET4454975687.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:30.384727955 CET50088445192.168.2.571.209.113.25
                                Jan 15, 2025 03:02:30.389553070 CET4455008871.209.113.25192.168.2.5
                                Jan 15, 2025 03:02:30.389636993 CET50088445192.168.2.571.209.113.25
                                Jan 15, 2025 03:02:30.389704943 CET50088445192.168.2.571.209.113.25
                                Jan 15, 2025 03:02:30.389831066 CET50089445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:30.394582033 CET4455008871.209.113.25192.168.2.5
                                Jan 15, 2025 03:02:30.394627094 CET4455008971.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:30.394635916 CET50088445192.168.2.571.209.113.25
                                Jan 15, 2025 03:02:30.394681931 CET50089445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:30.394819021 CET50089445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:30.395054102 CET50090445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:30.399631977 CET4455008971.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:30.399715900 CET50089445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:30.399897099 CET4455009071.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:30.399955034 CET50090445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:30.400005102 CET50090445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:30.404788017 CET4455009071.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:30.587512970 CET50092445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:30.592391968 CET4455009251.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:30.592600107 CET50092445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:30.592600107 CET50092445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:30.597446918 CET4455009251.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:31.586040974 CET44549781202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:31.586117983 CET49781445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:31.586190939 CET49781445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:31.586282969 CET49781445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:31.592669964 CET44549781202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:31.592684031 CET44549781202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:32.400285959 CET50105445192.168.2.594.178.69.176
                                Jan 15, 2025 03:02:32.405232906 CET4455010594.178.69.176192.168.2.5
                                Jan 15, 2025 03:02:32.406826973 CET50105445192.168.2.594.178.69.176
                                Jan 15, 2025 03:02:32.406842947 CET50105445192.168.2.594.178.69.176
                                Jan 15, 2025 03:02:32.406961918 CET50106445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:32.411741972 CET4455010694.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:32.411916018 CET4455010594.178.69.176192.168.2.5
                                Jan 15, 2025 03:02:32.411982059 CET50105445192.168.2.594.178.69.176
                                Jan 15, 2025 03:02:32.411995888 CET50106445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:32.412009001 CET50106445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:32.412278891 CET50107445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:32.417073011 CET4455010694.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:32.417104006 CET4455010794.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:32.417155981 CET50106445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:32.417180061 CET50107445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:32.417243004 CET50107445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:32.421981096 CET4455010794.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:32.587470055 CET50110445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:32.592298985 CET4455011087.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:32.592384100 CET50110445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:32.592437029 CET50110445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:32.597201109 CET4455011087.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:33.621164083 CET4454980554.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:33.621298075 CET49805445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:33.621385098 CET49805445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:33.621473074 CET49805445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:33.626305103 CET4454980554.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:33.626333952 CET4454980554.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:34.415966034 CET50120445192.168.2.5172.76.144.71
                                Jan 15, 2025 03:02:34.421751022 CET44550120172.76.144.71192.168.2.5
                                Jan 15, 2025 03:02:34.421838045 CET50120445192.168.2.5172.76.144.71
                                Jan 15, 2025 03:02:34.421947002 CET50120445192.168.2.5172.76.144.71
                                Jan 15, 2025 03:02:34.422096968 CET50122445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:34.427059889 CET44550120172.76.144.71192.168.2.5
                                Jan 15, 2025 03:02:34.427100897 CET44550122172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:34.427122116 CET50120445192.168.2.5172.76.144.71
                                Jan 15, 2025 03:02:34.427160978 CET50122445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:34.427244902 CET50122445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:34.427591085 CET50124445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:34.432243109 CET44550122172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:34.432301998 CET50122445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:34.432780981 CET44550124172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:34.432939053 CET50124445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:34.432939053 CET50124445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:34.438014984 CET44550124172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:34.588242054 CET50125445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:34.596065998 CET44550125202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:34.596328974 CET50125445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:34.596369982 CET50125445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:34.603458881 CET44550125202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:35.617341042 CET44549830138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:35.617391109 CET49830445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:35.617464066 CET49830445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:35.617533922 CET49830445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:35.622237921 CET44549830138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:35.622287035 CET44549830138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:36.431554079 CET50135445192.168.2.5147.254.104.12
                                Jan 15, 2025 03:02:36.436417103 CET44550135147.254.104.12192.168.2.5
                                Jan 15, 2025 03:02:36.436595917 CET50135445192.168.2.5147.254.104.12
                                Jan 15, 2025 03:02:36.436671019 CET50135445192.168.2.5147.254.104.12
                                Jan 15, 2025 03:02:36.436908960 CET50137445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:36.441628933 CET44550135147.254.104.12192.168.2.5
                                Jan 15, 2025 03:02:36.441689014 CET50135445192.168.2.5147.254.104.12
                                Jan 15, 2025 03:02:36.441723108 CET44550137147.254.104.1192.168.2.5
                                Jan 15, 2025 03:02:36.441773891 CET50137445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:36.441804886 CET50137445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:36.442143917 CET50138445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:36.446902037 CET44550137147.254.104.1192.168.2.5
                                Jan 15, 2025 03:02:36.446959972 CET50137445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:36.448209047 CET44550138147.254.104.1192.168.2.5
                                Jan 15, 2025 03:02:36.448271990 CET50138445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:36.448298931 CET50138445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:36.453052044 CET44550138147.254.104.1192.168.2.5
                                Jan 15, 2025 03:02:36.634530067 CET50139445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:36.639461994 CET4455013954.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:36.639559984 CET50139445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:36.639628887 CET50139445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:36.644416094 CET4455013954.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:37.654011011 CET44549855166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:37.654194117 CET49855445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:37.654270887 CET49855445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:37.654270887 CET49855445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:37.661421061 CET44549855166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:37.663639069 CET44549855166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:38.450213909 CET50151445192.168.2.515.48.9.73
                                Jan 15, 2025 03:02:38.455256939 CET4455015115.48.9.73192.168.2.5
                                Jan 15, 2025 03:02:38.455615044 CET50151445192.168.2.515.48.9.73
                                Jan 15, 2025 03:02:38.455615044 CET50151445192.168.2.515.48.9.73
                                Jan 15, 2025 03:02:38.455712080 CET50152445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:38.460675955 CET4455015215.48.9.1192.168.2.5
                                Jan 15, 2025 03:02:38.460747957 CET50152445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:38.460774899 CET50152445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:38.460808039 CET4455015115.48.9.73192.168.2.5
                                Jan 15, 2025 03:02:38.460860968 CET50151445192.168.2.515.48.9.73
                                Jan 15, 2025 03:02:38.461143017 CET50153445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:38.465662003 CET4455015215.48.9.1192.168.2.5
                                Jan 15, 2025 03:02:38.465763092 CET50152445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:38.465931892 CET4455015315.48.9.1192.168.2.5
                                Jan 15, 2025 03:02:38.465995073 CET50153445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:38.466037035 CET50153445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:38.470787048 CET4455015315.48.9.1192.168.2.5
                                Jan 15, 2025 03:02:38.618767977 CET50154445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:38.623748064 CET44550154138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:38.623864889 CET50154445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:38.623915911 CET50154445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:38.628828049 CET44550154138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:39.648749113 CET44549887179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:39.648839951 CET49887445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:39.649024010 CET49887445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:39.649035931 CET49887445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:39.656064987 CET44549887179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:39.657181978 CET44549887179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:40.322266102 CET50168445192.168.2.514.230.102.12
                                Jan 15, 2025 03:02:40.327361107 CET4455016814.230.102.12192.168.2.5
                                Jan 15, 2025 03:02:40.327459097 CET50168445192.168.2.514.230.102.12
                                Jan 15, 2025 03:02:40.327589035 CET50168445192.168.2.514.230.102.12
                                Jan 15, 2025 03:02:40.327843904 CET50169445192.168.2.514.230.102.1
                                Jan 15, 2025 03:02:40.332628965 CET4455016814.230.102.12192.168.2.5
                                Jan 15, 2025 03:02:40.332722902 CET50168445192.168.2.514.230.102.12
                                Jan 15, 2025 03:02:40.332807064 CET4455016914.230.102.1192.168.2.5
                                Jan 15, 2025 03:02:40.332884073 CET50169445192.168.2.514.230.102.1
                                Jan 15, 2025 03:02:40.333000898 CET50169445192.168.2.514.230.102.1
                                Jan 15, 2025 03:02:40.333393097 CET50170445192.168.2.514.230.102.1
                                Jan 15, 2025 03:02:40.338083982 CET4455016914.230.102.1192.168.2.5
                                Jan 15, 2025 03:02:40.338151932 CET50169445192.168.2.514.230.102.1
                                Jan 15, 2025 03:02:40.338336945 CET4455017014.230.102.1192.168.2.5
                                Jan 15, 2025 03:02:40.338409901 CET50170445192.168.2.514.230.102.1
                                Jan 15, 2025 03:02:40.338478088 CET50170445192.168.2.514.230.102.1
                                Jan 15, 2025 03:02:40.343326092 CET4455017014.230.102.1192.168.2.5
                                Jan 15, 2025 03:02:40.665647030 CET50173445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:40.672878027 CET44550173166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:40.672969103 CET50173445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:40.673008919 CET50173445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:02:40.677799940 CET44550173166.146.223.1192.168.2.5
                                Jan 15, 2025 03:02:41.775872946 CET4454992328.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:41.775959015 CET49923445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:41.776009083 CET49923445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:41.776063919 CET49923445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:41.780868053 CET4454992328.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:41.780880928 CET4454992328.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:42.072372913 CET50181445192.168.2.5131.112.24.46
                                Jan 15, 2025 03:02:42.078907013 CET44550181131.112.24.46192.168.2.5
                                Jan 15, 2025 03:02:42.079004049 CET50181445192.168.2.5131.112.24.46
                                Jan 15, 2025 03:02:42.079093933 CET50181445192.168.2.5131.112.24.46
                                Jan 15, 2025 03:02:42.079332113 CET50182445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:02:42.084955931 CET44550181131.112.24.46192.168.2.5
                                Jan 15, 2025 03:02:42.084971905 CET44550182131.112.24.1192.168.2.5
                                Jan 15, 2025 03:02:42.085042953 CET50181445192.168.2.5131.112.24.46
                                Jan 15, 2025 03:02:42.085098028 CET50182445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:02:42.085190058 CET50182445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:02:42.085623980 CET50183445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:02:42.090030909 CET44550182131.112.24.1192.168.2.5
                                Jan 15, 2025 03:02:42.090106964 CET50182445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:02:42.090426922 CET44550183131.112.24.1192.168.2.5
                                Jan 15, 2025 03:02:42.090545893 CET50183445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:02:42.090545893 CET50183445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:02:42.095386982 CET44550183131.112.24.1192.168.2.5
                                Jan 15, 2025 03:02:42.650172949 CET50187445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:42.655095100 CET44550187179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:42.655205011 CET50187445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:42.655245066 CET50187445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:02:42.659997940 CET44550187179.222.192.1192.168.2.5
                                Jan 15, 2025 03:02:43.695679903 CET4454996049.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:43.696943998 CET49960445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:43.696988106 CET49960445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:43.697048903 CET49960445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:43.701975107 CET4454996049.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:43.701986074 CET4454996049.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:43.712840080 CET50195445192.168.2.5169.206.133.252
                                Jan 15, 2025 03:02:43.717658043 CET44550195169.206.133.252192.168.2.5
                                Jan 15, 2025 03:02:43.717756033 CET50195445192.168.2.5169.206.133.252
                                Jan 15, 2025 03:02:43.717824936 CET50195445192.168.2.5169.206.133.252
                                Jan 15, 2025 03:02:43.718018055 CET50196445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:02:43.723541021 CET44550195169.206.133.252192.168.2.5
                                Jan 15, 2025 03:02:43.723558903 CET44550196169.206.133.1192.168.2.5
                                Jan 15, 2025 03:02:43.723639965 CET50195445192.168.2.5169.206.133.252
                                Jan 15, 2025 03:02:43.723690987 CET50196445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:02:43.723778009 CET50196445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:02:43.724237919 CET50197445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:02:43.728691101 CET44550196169.206.133.1192.168.2.5
                                Jan 15, 2025 03:02:43.729026079 CET44550197169.206.133.1192.168.2.5
                                Jan 15, 2025 03:02:43.729104996 CET50196445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:02:43.729216099 CET50197445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:02:43.729218006 CET50197445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:02:43.733997107 CET44550197169.206.133.1192.168.2.5
                                Jan 15, 2025 03:02:44.790549994 CET50205445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:44.795511961 CET4455020528.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:44.795924902 CET50205445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:44.795962095 CET50205445192.168.2.528.93.62.1
                                Jan 15, 2025 03:02:44.800745964 CET4455020528.93.62.1192.168.2.5
                                Jan 15, 2025 03:02:45.244223118 CET50209445192.168.2.5167.251.118.247
                                Jan 15, 2025 03:02:45.249100924 CET44550209167.251.118.247192.168.2.5
                                Jan 15, 2025 03:02:45.250909090 CET50209445192.168.2.5167.251.118.247
                                Jan 15, 2025 03:02:45.250951052 CET50209445192.168.2.5167.251.118.247
                                Jan 15, 2025 03:02:45.251166105 CET50210445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:02:45.256006002 CET44550210167.251.118.1192.168.2.5
                                Jan 15, 2025 03:02:45.256042004 CET44550209167.251.118.247192.168.2.5
                                Jan 15, 2025 03:02:45.256140947 CET50209445192.168.2.5167.251.118.247
                                Jan 15, 2025 03:02:45.256577015 CET50210445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:02:45.256627083 CET50211445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:02:45.261441946 CET44550211167.251.118.1192.168.2.5
                                Jan 15, 2025 03:02:45.261511087 CET44550210167.251.118.1192.168.2.5
                                Jan 15, 2025 03:02:45.261627913 CET50210445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:02:45.261709929 CET50211445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:02:45.261709929 CET50211445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:02:45.266532898 CET44550211167.251.118.1192.168.2.5
                                Jan 15, 2025 03:02:45.726982117 CET4454999553.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:45.728965998 CET49995445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:45.733002901 CET49995445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:45.733055115 CET49995445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:45.737796068 CET4454999553.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:45.737818003 CET4454999553.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:46.666052103 CET50221445192.168.2.540.149.165.176
                                Jan 15, 2025 03:02:46.670934916 CET4455022140.149.165.176192.168.2.5
                                Jan 15, 2025 03:02:46.671014071 CET50221445192.168.2.540.149.165.176
                                Jan 15, 2025 03:02:46.671091080 CET50221445192.168.2.540.149.165.176
                                Jan 15, 2025 03:02:46.671287060 CET50222445192.168.2.540.149.165.1
                                Jan 15, 2025 03:02:46.676050901 CET4455022240.149.165.1192.168.2.5
                                Jan 15, 2025 03:02:46.676106930 CET4455022140.149.165.176192.168.2.5
                                Jan 15, 2025 03:02:46.676111937 CET50222445192.168.2.540.149.165.1
                                Jan 15, 2025 03:02:46.676160097 CET50221445192.168.2.540.149.165.176
                                Jan 15, 2025 03:02:46.676223040 CET50222445192.168.2.540.149.165.1
                                Jan 15, 2025 03:02:46.676589012 CET50223445192.168.2.540.149.165.1
                                Jan 15, 2025 03:02:46.681102991 CET4455022240.149.165.1192.168.2.5
                                Jan 15, 2025 03:02:46.681149006 CET50222445192.168.2.540.149.165.1
                                Jan 15, 2025 03:02:46.681420088 CET4455022340.149.165.1192.168.2.5
                                Jan 15, 2025 03:02:46.681472063 CET50223445192.168.2.540.149.165.1
                                Jan 15, 2025 03:02:46.681497097 CET50223445192.168.2.540.149.165.1
                                Jan 15, 2025 03:02:46.686234951 CET4455022340.149.165.1192.168.2.5
                                Jan 15, 2025 03:02:46.712579012 CET50225445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:46.717495918 CET4455022549.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:46.717572927 CET50225445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:46.717602968 CET50225445192.168.2.549.6.113.1
                                Jan 15, 2025 03:02:46.722430944 CET4455022549.6.113.1192.168.2.5
                                Jan 15, 2025 03:02:47.824899912 CET445500323.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:47.824973106 CET50032445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:47.825031996 CET50032445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:47.825073957 CET50032445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:47.829879045 CET445500323.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:47.829910994 CET445500323.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:47.994101048 CET50234445192.168.2.5182.53.72.77
                                Jan 15, 2025 03:02:47.999147892 CET44550234182.53.72.77192.168.2.5
                                Jan 15, 2025 03:02:47.999258995 CET50234445192.168.2.5182.53.72.77
                                Jan 15, 2025 03:02:47.999340057 CET50234445192.168.2.5182.53.72.77
                                Jan 15, 2025 03:02:47.999589920 CET50235445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:48.004570007 CET44550234182.53.72.77192.168.2.5
                                Jan 15, 2025 03:02:48.004611015 CET44550235182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:48.004674911 CET50234445192.168.2.5182.53.72.77
                                Jan 15, 2025 03:02:48.004695892 CET50235445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:48.004800081 CET50235445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:48.005152941 CET50236445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:48.010102034 CET44550236182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:48.010185957 CET50236445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:48.010252953 CET50236445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:48.010266066 CET44550235182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:48.010360003 CET50235445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:48.015039921 CET44550236182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:48.748537064 CET50242445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:48.753396988 CET4455024253.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:48.753508091 CET50242445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:48.754113913 CET50242445192.168.2.553.251.246.1
                                Jan 15, 2025 03:02:48.758903980 CET4455024253.251.246.1192.168.2.5
                                Jan 15, 2025 03:02:49.228414059 CET50245445192.168.2.5178.163.243.164
                                Jan 15, 2025 03:02:49.237190008 CET44550245178.163.243.164192.168.2.5
                                Jan 15, 2025 03:02:49.237301111 CET50245445192.168.2.5178.163.243.164
                                Jan 15, 2025 03:02:49.237385988 CET50245445192.168.2.5178.163.243.164
                                Jan 15, 2025 03:02:49.237521887 CET50246445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:02:49.243792057 CET44550246178.163.243.1192.168.2.5
                                Jan 15, 2025 03:02:49.243804932 CET44550245178.163.243.164192.168.2.5
                                Jan 15, 2025 03:02:49.243848085 CET50246445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:02:49.243887901 CET50245445192.168.2.5178.163.243.164
                                Jan 15, 2025 03:02:49.244009018 CET50246445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:02:49.244369030 CET50247445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:02:49.248904943 CET44550246178.163.243.1192.168.2.5
                                Jan 15, 2025 03:02:49.248965025 CET50246445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:02:49.250581980 CET44550247178.163.243.1192.168.2.5
                                Jan 15, 2025 03:02:49.250648975 CET50247445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:02:49.250684023 CET50247445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:02:49.255414963 CET44550247178.163.243.1192.168.2.5
                                Jan 15, 2025 03:02:49.777615070 CET44550070144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:49.777679920 CET50070445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:49.777719021 CET50070445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:49.777772903 CET50070445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:49.782516003 CET44550070144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:49.782538891 CET44550070144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:50.094415903 CET4455007359.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:50.094547033 CET50073445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:50.094635010 CET50073445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:50.094659090 CET50073445192.168.2.559.189.210.1
                                Jan 15, 2025 03:02:50.102638006 CET4455007359.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:50.102669001 CET4455007359.189.210.1192.168.2.5
                                Jan 15, 2025 03:02:50.150590897 CET50253445192.168.2.559.189.210.2
                                Jan 15, 2025 03:02:50.157970905 CET4455025359.189.210.2192.168.2.5
                                Jan 15, 2025 03:02:50.158077955 CET50253445192.168.2.559.189.210.2
                                Jan 15, 2025 03:02:50.158148050 CET50253445192.168.2.559.189.210.2
                                Jan 15, 2025 03:02:50.158586025 CET50254445192.168.2.559.189.210.2
                                Jan 15, 2025 03:02:50.165895939 CET4455025359.189.210.2192.168.2.5
                                Jan 15, 2025 03:02:50.165916920 CET4455025459.189.210.2192.168.2.5
                                Jan 15, 2025 03:02:50.165966988 CET50253445192.168.2.559.189.210.2
                                Jan 15, 2025 03:02:50.166017056 CET50254445192.168.2.559.189.210.2
                                Jan 15, 2025 03:02:50.166058064 CET50254445192.168.2.559.189.210.2
                                Jan 15, 2025 03:02:50.172517061 CET4455025459.189.210.2192.168.2.5
                                Jan 15, 2025 03:02:50.252273083 CET44550236182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:50.252356052 CET50236445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:50.252391100 CET50236445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:50.252430916 CET50236445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:50.257210970 CET44550236182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:50.257234097 CET44550236182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:50.384648085 CET50258445192.168.2.5201.215.187.250
                                Jan 15, 2025 03:02:50.392252922 CET44550258201.215.187.250192.168.2.5
                                Jan 15, 2025 03:02:50.392405033 CET50258445192.168.2.5201.215.187.250
                                Jan 15, 2025 03:02:50.392515898 CET50258445192.168.2.5201.215.187.250
                                Jan 15, 2025 03:02:50.392519951 CET50259445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:02:50.401004076 CET44550259201.215.187.1192.168.2.5
                                Jan 15, 2025 03:02:50.401103973 CET50259445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:02:50.401129007 CET50259445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:02:50.401130915 CET44550258201.215.187.250192.168.2.5
                                Jan 15, 2025 03:02:50.401197910 CET50258445192.168.2.5201.215.187.250
                                Jan 15, 2025 03:02:50.401521921 CET50260445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:02:50.409071922 CET44550259201.215.187.1192.168.2.5
                                Jan 15, 2025 03:02:50.409145117 CET50259445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:02:50.411740065 CET44550260201.215.187.1192.168.2.5
                                Jan 15, 2025 03:02:50.411915064 CET50260445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:02:50.411915064 CET50260445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:02:50.419795990 CET44550260201.215.187.1192.168.2.5
                                Jan 15, 2025 03:02:50.837790012 CET50263445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:50.843353987 CET445502633.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:50.843452930 CET50263445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:50.843507051 CET50263445192.168.2.53.41.196.1
                                Jan 15, 2025 03:02:50.849112988 CET445502633.41.196.1192.168.2.5
                                Jan 15, 2025 03:02:51.462742090 CET50269445192.168.2.584.62.63.88
                                Jan 15, 2025 03:02:51.467686892 CET4455026984.62.63.88192.168.2.5
                                Jan 15, 2025 03:02:51.467758894 CET50269445192.168.2.584.62.63.88
                                Jan 15, 2025 03:02:51.467787027 CET50269445192.168.2.584.62.63.88
                                Jan 15, 2025 03:02:51.467972040 CET50270445192.168.2.584.62.63.1
                                Jan 15, 2025 03:02:51.472834110 CET4455027084.62.63.1192.168.2.5
                                Jan 15, 2025 03:02:51.472845078 CET4455026984.62.63.88192.168.2.5
                                Jan 15, 2025 03:02:51.472888947 CET50270445192.168.2.584.62.63.1
                                Jan 15, 2025 03:02:51.472924948 CET50269445192.168.2.584.62.63.88
                                Jan 15, 2025 03:02:51.473006964 CET50270445192.168.2.584.62.63.1
                                Jan 15, 2025 03:02:51.473273039 CET50271445192.168.2.584.62.63.1
                                Jan 15, 2025 03:02:51.477886915 CET4455027084.62.63.1192.168.2.5
                                Jan 15, 2025 03:02:51.477941036 CET50270445192.168.2.584.62.63.1
                                Jan 15, 2025 03:02:51.478076935 CET4455027184.62.63.1192.168.2.5
                                Jan 15, 2025 03:02:51.478132963 CET50271445192.168.2.584.62.63.1
                                Jan 15, 2025 03:02:51.478171110 CET50271445192.168.2.584.62.63.1
                                Jan 15, 2025 03:02:51.482929945 CET4455027184.62.63.1192.168.2.5
                                Jan 15, 2025 03:02:51.758265018 CET4455009071.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:51.758339882 CET50090445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:51.758394957 CET50090445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:51.758444071 CET50090445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:51.763539076 CET4455009071.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:51.763550043 CET4455009071.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:51.945786953 CET4455009251.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:51.945890903 CET50092445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:51.945935965 CET50092445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:51.945986986 CET50092445192.168.2.551.1.151.1
                                Jan 15, 2025 03:02:51.950696945 CET4455009251.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:51.950720072 CET4455009251.1.151.1192.168.2.5
                                Jan 15, 2025 03:02:52.009840965 CET50275445192.168.2.551.1.151.2
                                Jan 15, 2025 03:02:52.014640093 CET4455027551.1.151.2192.168.2.5
                                Jan 15, 2025 03:02:52.014729023 CET50275445192.168.2.551.1.151.2
                                Jan 15, 2025 03:02:52.014853954 CET50275445192.168.2.551.1.151.2
                                Jan 15, 2025 03:02:52.015331030 CET50276445192.168.2.551.1.151.2
                                Jan 15, 2025 03:02:52.019757032 CET4455027551.1.151.2192.168.2.5
                                Jan 15, 2025 03:02:52.019814968 CET50275445192.168.2.551.1.151.2
                                Jan 15, 2025 03:02:52.020107031 CET4455027651.1.151.2192.168.2.5
                                Jan 15, 2025 03:02:52.020176888 CET50276445192.168.2.551.1.151.2
                                Jan 15, 2025 03:02:52.020204067 CET50276445192.168.2.551.1.151.2
                                Jan 15, 2025 03:02:52.024981022 CET4455027651.1.151.2192.168.2.5
                                Jan 15, 2025 03:02:52.478699923 CET50279445192.168.2.53.201.78.218
                                Jan 15, 2025 03:02:52.483514071 CET445502793.201.78.218192.168.2.5
                                Jan 15, 2025 03:02:52.483587980 CET50279445192.168.2.53.201.78.218
                                Jan 15, 2025 03:02:52.483643055 CET50279445192.168.2.53.201.78.218
                                Jan 15, 2025 03:02:52.483772039 CET50280445192.168.2.53.201.78.1
                                Jan 15, 2025 03:02:52.488574028 CET445502803.201.78.1192.168.2.5
                                Jan 15, 2025 03:02:52.488595009 CET445502793.201.78.218192.168.2.5
                                Jan 15, 2025 03:02:52.488624096 CET50280445192.168.2.53.201.78.1
                                Jan 15, 2025 03:02:52.488651037 CET50279445192.168.2.53.201.78.218
                                Jan 15, 2025 03:02:52.488759995 CET50280445192.168.2.53.201.78.1
                                Jan 15, 2025 03:02:52.489161968 CET50281445192.168.2.53.201.78.1
                                Jan 15, 2025 03:02:52.493547916 CET445502803.201.78.1192.168.2.5
                                Jan 15, 2025 03:02:52.493598938 CET50280445192.168.2.53.201.78.1
                                Jan 15, 2025 03:02:52.493901014 CET445502813.201.78.1192.168.2.5
                                Jan 15, 2025 03:02:52.493962049 CET50281445192.168.2.53.201.78.1
                                Jan 15, 2025 03:02:52.494002104 CET50281445192.168.2.53.201.78.1
                                Jan 15, 2025 03:02:52.498712063 CET445502813.201.78.1192.168.2.5
                                Jan 15, 2025 03:02:52.790597916 CET50285445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:52.795927048 CET44550285144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:52.796036959 CET50285445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:52.796092033 CET50285445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:02:52.800849915 CET44550285144.134.14.1192.168.2.5
                                Jan 15, 2025 03:02:53.259331942 CET50289445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:53.264250040 CET44550289182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:53.264344931 CET50289445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:53.264426947 CET50289445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:53.269211054 CET44550289182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:53.416143894 CET50292445192.168.2.5116.150.25.13
                                Jan 15, 2025 03:02:53.423544884 CET44550292116.150.25.13192.168.2.5
                                Jan 15, 2025 03:02:53.423675060 CET50292445192.168.2.5116.150.25.13
                                Jan 15, 2025 03:02:53.423692942 CET50292445192.168.2.5116.150.25.13
                                Jan 15, 2025 03:02:53.423820972 CET50293445192.168.2.5116.150.25.1
                                Jan 15, 2025 03:02:53.431386948 CET44550293116.150.25.1192.168.2.5
                                Jan 15, 2025 03:02:53.431401968 CET44550292116.150.25.13192.168.2.5
                                Jan 15, 2025 03:02:53.431509018 CET50292445192.168.2.5116.150.25.13
                                Jan 15, 2025 03:02:53.431509018 CET50293445192.168.2.5116.150.25.1
                                Jan 15, 2025 03:02:53.431925058 CET50294445192.168.2.5116.150.25.1
                                Jan 15, 2025 03:02:53.439165115 CET44550294116.150.25.1192.168.2.5
                                Jan 15, 2025 03:02:53.439248085 CET50294445192.168.2.5116.150.25.1
                                Jan 15, 2025 03:02:53.439280987 CET50294445192.168.2.5116.150.25.1
                                Jan 15, 2025 03:02:53.439332008 CET44550293116.150.25.1192.168.2.5
                                Jan 15, 2025 03:02:53.439378977 CET50293445192.168.2.5116.150.25.1
                                Jan 15, 2025 03:02:53.446902990 CET44550294116.150.25.1192.168.2.5
                                Jan 15, 2025 03:02:53.795303106 CET4455010794.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:53.796242952 CET50107445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:53.796458006 CET50107445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:53.796458006 CET50107445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:53.801279068 CET4455010794.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:53.801290035 CET4455010794.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:53.965272903 CET4455011087.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:53.965521097 CET50110445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:53.966018915 CET50110445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:53.966099024 CET50110445192.168.2.587.156.197.1
                                Jan 15, 2025 03:02:53.970776081 CET4455011087.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:53.970812082 CET4455011087.156.197.1192.168.2.5
                                Jan 15, 2025 03:02:54.025000095 CET50299445192.168.2.587.156.197.2
                                Jan 15, 2025 03:02:54.029812098 CET4455029987.156.197.2192.168.2.5
                                Jan 15, 2025 03:02:54.029876947 CET50299445192.168.2.587.156.197.2
                                Jan 15, 2025 03:02:54.029917002 CET50299445192.168.2.587.156.197.2
                                Jan 15, 2025 03:02:54.030318975 CET50301445192.168.2.587.156.197.2
                                Jan 15, 2025 03:02:54.034869909 CET4455029987.156.197.2192.168.2.5
                                Jan 15, 2025 03:02:54.034924984 CET50299445192.168.2.587.156.197.2
                                Jan 15, 2025 03:02:54.035104036 CET4455030187.156.197.2192.168.2.5
                                Jan 15, 2025 03:02:54.035156012 CET50301445192.168.2.587.156.197.2
                                Jan 15, 2025 03:02:54.035182953 CET50301445192.168.2.587.156.197.2
                                Jan 15, 2025 03:02:54.039956093 CET4455030187.156.197.2192.168.2.5
                                Jan 15, 2025 03:02:54.290888071 CET50302445192.168.2.524.177.121.21
                                Jan 15, 2025 03:02:54.295716047 CET4455030224.177.121.21192.168.2.5
                                Jan 15, 2025 03:02:54.295797110 CET50302445192.168.2.524.177.121.21
                                Jan 15, 2025 03:02:54.295819998 CET50302445192.168.2.524.177.121.21
                                Jan 15, 2025 03:02:54.295953989 CET50303445192.168.2.524.177.121.1
                                Jan 15, 2025 03:02:54.300698996 CET4455030324.177.121.1192.168.2.5
                                Jan 15, 2025 03:02:54.300746918 CET4455030224.177.121.21192.168.2.5
                                Jan 15, 2025 03:02:54.300762892 CET50303445192.168.2.524.177.121.1
                                Jan 15, 2025 03:02:54.300789118 CET50303445192.168.2.524.177.121.1
                                Jan 15, 2025 03:02:54.300791979 CET50302445192.168.2.524.177.121.21
                                Jan 15, 2025 03:02:54.301071882 CET50304445192.168.2.524.177.121.1
                                Jan 15, 2025 03:02:54.305696011 CET4455030324.177.121.1192.168.2.5
                                Jan 15, 2025 03:02:54.305798054 CET50303445192.168.2.524.177.121.1
                                Jan 15, 2025 03:02:54.305876970 CET4455030424.177.121.1192.168.2.5
                                Jan 15, 2025 03:02:54.305962086 CET50304445192.168.2.524.177.121.1
                                Jan 15, 2025 03:02:54.305984020 CET50304445192.168.2.524.177.121.1
                                Jan 15, 2025 03:02:54.310695887 CET4455030424.177.121.1192.168.2.5
                                Jan 15, 2025 03:02:54.759423018 CET50307445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:54.897315025 CET4455030771.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:54.897739887 CET50307445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:54.897823095 CET50307445192.168.2.571.209.113.1
                                Jan 15, 2025 03:02:54.902621984 CET4455030771.209.113.1192.168.2.5
                                Jan 15, 2025 03:02:55.119132996 CET50311445192.168.2.5111.249.150.243
                                Jan 15, 2025 03:02:55.123977900 CET44550311111.249.150.243192.168.2.5
                                Jan 15, 2025 03:02:55.124058008 CET50311445192.168.2.5111.249.150.243
                                Jan 15, 2025 03:02:55.124131918 CET50311445192.168.2.5111.249.150.243
                                Jan 15, 2025 03:02:55.124294996 CET50312445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:02:55.129035950 CET44550311111.249.150.243192.168.2.5
                                Jan 15, 2025 03:02:55.129110098 CET50311445192.168.2.5111.249.150.243
                                Jan 15, 2025 03:02:55.129156113 CET44550312111.249.150.1192.168.2.5
                                Jan 15, 2025 03:02:55.129225016 CET50312445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:02:55.129322052 CET50312445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:02:55.129621983 CET50313445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:02:55.134224892 CET44550312111.249.150.1192.168.2.5
                                Jan 15, 2025 03:02:55.134277105 CET50312445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:02:55.134475946 CET44550313111.249.150.1192.168.2.5
                                Jan 15, 2025 03:02:55.134546041 CET50313445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:02:55.134592056 CET50313445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:02:55.139405012 CET44550313111.249.150.1192.168.2.5
                                Jan 15, 2025 03:02:55.492484093 CET44550289182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:55.492573023 CET50289445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:55.492652893 CET50289445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:55.492652893 CET50289445192.168.2.5182.53.72.1
                                Jan 15, 2025 03:02:55.497572899 CET44550289182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:55.497603893 CET44550289182.53.72.1192.168.2.5
                                Jan 15, 2025 03:02:55.556478977 CET50317445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:02:55.561281919 CET44550317182.53.72.2192.168.2.5
                                Jan 15, 2025 03:02:55.561377048 CET50317445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:02:55.561423063 CET50317445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:02:55.561840057 CET50318445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:02:55.566395998 CET44550317182.53.72.2192.168.2.5
                                Jan 15, 2025 03:02:55.566482067 CET50317445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:02:55.566597939 CET44550318182.53.72.2192.168.2.5
                                Jan 15, 2025 03:02:55.566662073 CET50318445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:02:55.566700935 CET50318445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:02:55.571438074 CET44550318182.53.72.2192.168.2.5
                                Jan 15, 2025 03:02:55.811511993 CET44550124172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:55.811611891 CET50124445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:55.811650038 CET50124445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:55.811700106 CET50124445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:55.816435099 CET44550124172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:55.816447020 CET44550124172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:55.884748936 CET50322445192.168.2.5181.91.195.194
                                Jan 15, 2025 03:02:55.891046047 CET44550322181.91.195.194192.168.2.5
                                Jan 15, 2025 03:02:55.891149998 CET50322445192.168.2.5181.91.195.194
                                Jan 15, 2025 03:02:55.891262054 CET50322445192.168.2.5181.91.195.194
                                Jan 15, 2025 03:02:55.891266108 CET50323445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:02:55.898564100 CET44550323181.91.195.1192.168.2.5
                                Jan 15, 2025 03:02:55.898633003 CET50323445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:02:55.898709059 CET44550322181.91.195.194192.168.2.5
                                Jan 15, 2025 03:02:55.898732901 CET50323445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:02:55.898749113 CET50322445192.168.2.5181.91.195.194
                                Jan 15, 2025 03:02:55.898992062 CET50324445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:02:55.906147957 CET44550323181.91.195.1192.168.2.5
                                Jan 15, 2025 03:02:55.906333923 CET50323445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:02:55.908173084 CET44550324181.91.195.1192.168.2.5
                                Jan 15, 2025 03:02:55.908253908 CET50324445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:02:55.908286095 CET50324445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:02:55.916608095 CET44550324181.91.195.1192.168.2.5
                                Jan 15, 2025 03:02:55.977811098 CET44550125202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:55.977921009 CET50125445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:55.977960110 CET50125445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:55.978032112 CET50125445192.168.2.5202.240.73.1
                                Jan 15, 2025 03:02:55.985172987 CET44550125202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:55.987426996 CET44550125202.240.73.1192.168.2.5
                                Jan 15, 2025 03:02:56.040775061 CET50325445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:02:56.045803070 CET44550325202.240.73.2192.168.2.5
                                Jan 15, 2025 03:02:56.045953035 CET50325445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:02:56.046032906 CET50325445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:02:56.046375990 CET50326445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:02:56.051115036 CET44550325202.240.73.2192.168.2.5
                                Jan 15, 2025 03:02:56.051187038 CET50325445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:02:56.051310062 CET44550326202.240.73.2192.168.2.5
                                Jan 15, 2025 03:02:56.051400900 CET50326445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:02:56.051450014 CET50326445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:02:56.056519032 CET44550326202.240.73.2192.168.2.5
                                Jan 15, 2025 03:02:56.806212902 CET50333445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:56.811582088 CET4455033394.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:56.811690092 CET50333445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:56.811800957 CET50333445192.168.2.594.178.69.1
                                Jan 15, 2025 03:02:56.817181110 CET4455033394.178.69.1192.168.2.5
                                Jan 15, 2025 03:02:57.823002100 CET44550138147.254.104.1192.168.2.5
                                Jan 15, 2025 03:02:57.823172092 CET50138445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:57.835966110 CET50138445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:57.836018085 CET50138445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:02:57.840831995 CET44550138147.254.104.1192.168.2.5
                                Jan 15, 2025 03:02:57.840848923 CET44550138147.254.104.1192.168.2.5
                                Jan 15, 2025 03:02:57.992311001 CET4455013954.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:57.992382050 CET50139445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:57.992439985 CET50139445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:57.992501974 CET50139445192.168.2.554.170.200.1
                                Jan 15, 2025 03:02:57.997210026 CET4455013954.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:57.997337103 CET4455013954.170.200.1192.168.2.5
                                Jan 15, 2025 03:02:58.057060957 CET50343445192.168.2.554.170.200.2
                                Jan 15, 2025 03:02:58.064726114 CET4455034354.170.200.2192.168.2.5
                                Jan 15, 2025 03:02:58.065011978 CET50343445192.168.2.554.170.200.2
                                Jan 15, 2025 03:02:58.065077066 CET50343445192.168.2.554.170.200.2
                                Jan 15, 2025 03:02:58.065464020 CET50344445192.168.2.554.170.200.2
                                Jan 15, 2025 03:02:58.073004007 CET4455034354.170.200.2192.168.2.5
                                Jan 15, 2025 03:02:58.073071003 CET50343445192.168.2.554.170.200.2
                                Jan 15, 2025 03:02:58.075658083 CET4455034454.170.200.2192.168.2.5
                                Jan 15, 2025 03:02:58.075726032 CET50344445192.168.2.554.170.200.2
                                Jan 15, 2025 03:02:58.075803041 CET50344445192.168.2.554.170.200.2
                                Jan 15, 2025 03:02:58.083956003 CET4455034454.170.200.2192.168.2.5
                                Jan 15, 2025 03:02:58.821996927 CET50351445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:58.826827049 CET44550351172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:58.826914072 CET50351445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:58.826986074 CET50351445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:02:58.831778049 CET44550351172.76.144.1192.168.2.5
                                Jan 15, 2025 03:02:59.821059942 CET4455015315.48.9.1192.168.2.5
                                Jan 15, 2025 03:02:59.821193933 CET50153445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:59.821194887 CET50153445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:59.821244001 CET50153445192.168.2.515.48.9.1
                                Jan 15, 2025 03:02:59.825993061 CET4455015315.48.9.1192.168.2.5
                                Jan 15, 2025 03:02:59.826001883 CET4455015315.48.9.1192.168.2.5
                                Jan 15, 2025 03:02:59.992808104 CET44550154138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:59.992878914 CET50154445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:59.992948055 CET50154445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:59.993019104 CET50154445192.168.2.5138.229.217.1
                                Jan 15, 2025 03:02:59.997644901 CET44550154138.229.217.1192.168.2.5
                                Jan 15, 2025 03:02:59.997720957 CET44550154138.229.217.1192.168.2.5
                                Jan 15, 2025 03:03:00.056369066 CET50367445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:00.061216116 CET44550367138.229.217.2192.168.2.5
                                Jan 15, 2025 03:03:00.061280966 CET50367445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:00.061371088 CET50367445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:00.061898947 CET50368445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:00.066242933 CET44550367138.229.217.2192.168.2.5
                                Jan 15, 2025 03:03:00.066288948 CET50367445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:00.066658974 CET44550368138.229.217.2192.168.2.5
                                Jan 15, 2025 03:03:00.066711903 CET50368445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:00.066741943 CET50368445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:00.071569920 CET44550368138.229.217.2192.168.2.5
                                Jan 15, 2025 03:03:00.837563038 CET50381445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:03:00.842411041 CET44550381147.254.104.1192.168.2.5
                                Jan 15, 2025 03:03:00.842511892 CET50381445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:03:00.842544079 CET50381445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:03:00.847297907 CET44550381147.254.104.1192.168.2.5
                                Jan 15, 2025 03:03:01.732829094 CET4455017014.230.102.1192.168.2.5
                                Jan 15, 2025 03:03:01.732933044 CET50170445192.168.2.514.230.102.1
                                Jan 15, 2025 03:03:01.732969999 CET50170445192.168.2.514.230.102.1
                                Jan 15, 2025 03:03:01.733019114 CET50170445192.168.2.514.230.102.1
                                Jan 15, 2025 03:03:01.738802910 CET4455017014.230.102.1192.168.2.5
                                Jan 15, 2025 03:03:01.738812923 CET4455017014.230.102.1192.168.2.5
                                Jan 15, 2025 03:03:02.076608896 CET44550173166.146.223.1192.168.2.5
                                Jan 15, 2025 03:03:02.079011917 CET50173445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:03:02.079011917 CET50173445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:03:02.079011917 CET50173445192.168.2.5166.146.223.1
                                Jan 15, 2025 03:03:02.084078074 CET44550173166.146.223.1192.168.2.5
                                Jan 15, 2025 03:03:02.084089994 CET44550173166.146.223.1192.168.2.5
                                Jan 15, 2025 03:03:02.134727001 CET50396445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:02.139734983 CET44550396166.146.223.2192.168.2.5
                                Jan 15, 2025 03:03:02.139842987 CET50396445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:02.139894009 CET50396445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:02.140309095 CET50397445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:02.145009995 CET44550396166.146.223.2192.168.2.5
                                Jan 15, 2025 03:03:02.145085096 CET50396445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:02.145247936 CET44550397166.146.223.2192.168.2.5
                                Jan 15, 2025 03:03:02.146560907 CET50397445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:02.146610975 CET50397445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:02.151459932 CET44550397166.146.223.2192.168.2.5
                                Jan 15, 2025 03:03:02.822735071 CET50407445192.168.2.515.48.9.1
                                Jan 15, 2025 03:03:02.827578068 CET4455040715.48.9.1192.168.2.5
                                Jan 15, 2025 03:03:02.827647924 CET50407445192.168.2.515.48.9.1
                                Jan 15, 2025 03:03:02.827703953 CET50407445192.168.2.515.48.9.1
                                Jan 15, 2025 03:03:02.832470894 CET4455040715.48.9.1192.168.2.5
                                Jan 15, 2025 03:03:03.461581945 CET44550183131.112.24.1192.168.2.5
                                Jan 15, 2025 03:03:03.461649895 CET50183445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:03:03.461688995 CET50183445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:03:03.461751938 CET50183445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:03:03.466594934 CET44550183131.112.24.1192.168.2.5
                                Jan 15, 2025 03:03:03.466607094 CET44550183131.112.24.1192.168.2.5
                                Jan 15, 2025 03:03:04.024097919 CET44550187179.222.192.1192.168.2.5
                                Jan 15, 2025 03:03:04.024779081 CET50187445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:03:04.024826050 CET50187445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:03:04.024859905 CET50187445192.168.2.5179.222.192.1
                                Jan 15, 2025 03:03:04.029613018 CET44550187179.222.192.1192.168.2.5
                                Jan 15, 2025 03:03:04.029742002 CET44550187179.222.192.1192.168.2.5
                                Jan 15, 2025 03:03:04.088761091 CET50429445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:04.093635082 CET44550429179.222.192.2192.168.2.5
                                Jan 15, 2025 03:03:04.093715906 CET50429445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:04.093755960 CET50429445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:04.094135046 CET50430445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:04.098649979 CET44550429179.222.192.2192.168.2.5
                                Jan 15, 2025 03:03:04.098885059 CET44550430179.222.192.2192.168.2.5
                                Jan 15, 2025 03:03:04.098895073 CET50429445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:04.098948956 CET50430445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:04.098970890 CET50430445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:04.103704929 CET44550430179.222.192.2192.168.2.5
                                Jan 15, 2025 03:03:04.744524002 CET50447445192.168.2.514.230.102.1
                                Jan 15, 2025 03:03:04.749401093 CET4455044714.230.102.1192.168.2.5
                                Jan 15, 2025 03:03:04.749560118 CET50447445192.168.2.514.230.102.1
                                Jan 15, 2025 03:03:04.749583006 CET50447445192.168.2.514.230.102.1
                                Jan 15, 2025 03:03:04.754415035 CET4455044714.230.102.1192.168.2.5
                                Jan 15, 2025 03:03:05.104131937 CET44550197169.206.133.1192.168.2.5
                                Jan 15, 2025 03:03:05.104284048 CET50197445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:03:05.104392052 CET50197445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:03:05.104393005 CET50197445192.168.2.5169.206.133.1
                                Jan 15, 2025 03:03:05.109360933 CET44550197169.206.133.1192.168.2.5
                                Jan 15, 2025 03:03:05.109379053 CET44550197169.206.133.1192.168.2.5
                                Jan 15, 2025 03:03:06.165174007 CET4455020528.93.62.1192.168.2.5
                                Jan 15, 2025 03:03:06.165314913 CET50205445192.168.2.528.93.62.1
                                Jan 15, 2025 03:03:06.165760040 CET50205445192.168.2.528.93.62.1
                                Jan 15, 2025 03:03:06.165808916 CET50205445192.168.2.528.93.62.1
                                Jan 15, 2025 03:03:06.170617104 CET4455020528.93.62.1192.168.2.5
                                Jan 15, 2025 03:03:06.170629978 CET4455020528.93.62.1192.168.2.5
                                Jan 15, 2025 03:03:06.228135109 CET50496445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:06.233788967 CET4455049628.93.62.2192.168.2.5
                                Jan 15, 2025 03:03:06.233980894 CET50496445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:06.234091997 CET50496445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:06.234502077 CET50497445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:06.239362001 CET4455049628.93.62.2192.168.2.5
                                Jan 15, 2025 03:03:06.239368916 CET4455049728.93.62.2192.168.2.5
                                Jan 15, 2025 03:03:06.239449024 CET50496445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:06.239479065 CET50497445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:06.239505053 CET50497445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:06.246880054 CET4455049728.93.62.2192.168.2.5
                                Jan 15, 2025 03:03:06.462663889 CET50509445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:03:06.470653057 CET44550509131.112.24.1192.168.2.5
                                Jan 15, 2025 03:03:06.470727921 CET50509445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:03:06.470763922 CET50509445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:03:06.478974104 CET44550509131.112.24.1192.168.2.5
                                Jan 15, 2025 03:03:06.621057034 CET44550211167.251.118.1192.168.2.5
                                Jan 15, 2025 03:03:06.621179104 CET50211445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:03:06.621226072 CET50211445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:03:06.621268034 CET50211445192.168.2.5167.251.118.1
                                Jan 15, 2025 03:03:06.627149105 CET44550211167.251.118.1192.168.2.5
                                Jan 15, 2025 03:03:06.627155066 CET44550211167.251.118.1192.168.2.5
                                Jan 15, 2025 03:03:08.127734900 CET4455022549.6.113.1192.168.2.5
                                Jan 15, 2025 03:03:08.127753973 CET4455022340.149.165.1192.168.2.5
                                Jan 15, 2025 03:03:08.127876043 CET50225445192.168.2.549.6.113.1
                                Jan 15, 2025 03:03:08.128142118 CET50223445192.168.2.540.149.165.1
                                Jan 15, 2025 03:03:09.329447031 CET50326445192.168.2.5202.240.73.2
                                Jan 15, 2025 03:03:09.329480886 CET50276445192.168.2.551.1.151.2
                                Jan 15, 2025 03:03:09.329514980 CET50254445192.168.2.559.189.210.2
                                Jan 15, 2025 03:03:09.329552889 CET50225445192.168.2.549.6.113.1
                                Jan 15, 2025 03:03:09.329569101 CET50344445192.168.2.554.170.200.2
                                Jan 15, 2025 03:03:09.329616070 CET50397445192.168.2.5166.146.223.2
                                Jan 15, 2025 03:03:09.329632044 CET50430445192.168.2.5179.222.192.2
                                Jan 15, 2025 03:03:09.329657078 CET50223445192.168.2.540.149.165.1
                                Jan 15, 2025 03:03:09.329710960 CET50247445192.168.2.5178.163.243.1
                                Jan 15, 2025 03:03:09.329725027 CET50260445192.168.2.5201.215.187.1
                                Jan 15, 2025 03:03:09.329746962 CET50263445192.168.2.53.41.196.1
                                Jan 15, 2025 03:03:09.329776049 CET50271445192.168.2.584.62.63.1
                                Jan 15, 2025 03:03:09.329796076 CET50242445192.168.2.553.251.246.1
                                Jan 15, 2025 03:03:09.329802036 CET50281445192.168.2.53.201.78.1
                                Jan 15, 2025 03:03:09.329837084 CET50285445192.168.2.5144.134.14.1
                                Jan 15, 2025 03:03:09.329893112 CET50294445192.168.2.5116.150.25.1
                                Jan 15, 2025 03:03:09.329921007 CET50301445192.168.2.587.156.197.2
                                Jan 15, 2025 03:03:09.329938889 CET50304445192.168.2.524.177.121.1
                                Jan 15, 2025 03:03:09.329956055 CET50307445192.168.2.571.209.113.1
                                Jan 15, 2025 03:03:09.329986095 CET50313445192.168.2.5111.249.150.1
                                Jan 15, 2025 03:03:09.330003977 CET50318445192.168.2.5182.53.72.2
                                Jan 15, 2025 03:03:09.330029011 CET50324445192.168.2.5181.91.195.1
                                Jan 15, 2025 03:03:09.330063105 CET50368445192.168.2.5138.229.217.2
                                Jan 15, 2025 03:03:09.330091000 CET50333445192.168.2.594.178.69.1
                                Jan 15, 2025 03:03:09.330106974 CET50407445192.168.2.515.48.9.1
                                Jan 15, 2025 03:03:09.330137014 CET50351445192.168.2.5172.76.144.1
                                Jan 15, 2025 03:03:09.330147028 CET50381445192.168.2.5147.254.104.1
                                Jan 15, 2025 03:03:09.330180883 CET50447445192.168.2.514.230.102.1
                                Jan 15, 2025 03:03:09.330373049 CET50497445192.168.2.528.93.62.2
                                Jan 15, 2025 03:03:09.330420017 CET50509445192.168.2.5131.112.24.1
                                Jan 15, 2025 03:04:09.362214088 CET5060880192.168.2.5104.16.167.228
                                Jan 15, 2025 03:04:09.370095968 CET8050608104.16.167.228192.168.2.5
                                Jan 15, 2025 03:04:09.370179892 CET5060880192.168.2.5104.16.167.228
                                Jan 15, 2025 03:04:09.370990038 CET5060880192.168.2.5104.16.167.228
                                Jan 15, 2025 03:04:09.378977060 CET8050608104.16.167.228192.168.2.5
                                Jan 15, 2025 03:04:09.867110968 CET8050608104.16.167.228192.168.2.5
                                Jan 15, 2025 03:04:09.867136002 CET8050608104.16.167.228192.168.2.5
                                Jan 15, 2025 03:04:09.867214918 CET5060880192.168.2.5104.16.167.228
                                Jan 15, 2025 03:04:09.867333889 CET5060880192.168.2.5104.16.167.228
                                Jan 15, 2025 03:04:09.873064041 CET8050608104.16.167.228192.168.2.5
                                Jan 15, 2025 03:04:09.876938105 CET50609445192.168.2.5195.82.36.20
                                Jan 15, 2025 03:04:09.882417917 CET44550609195.82.36.20192.168.2.5
                                Jan 15, 2025 03:04:09.882518053 CET50609445192.168.2.5195.82.36.20
                                Jan 15, 2025 03:04:09.882553101 CET50609445192.168.2.5195.82.36.20
                                Jan 15, 2025 03:04:09.882673025 CET50611445192.168.2.5195.82.36.1
                                Jan 15, 2025 03:04:09.887644053 CET44550609195.82.36.20192.168.2.5
                                Jan 15, 2025 03:04:09.887700081 CET50609445192.168.2.5195.82.36.20
                                Jan 15, 2025 03:04:09.888190985 CET44550611195.82.36.1192.168.2.5
                                Jan 15, 2025 03:04:09.888850927 CET50611445192.168.2.5195.82.36.1
                                Jan 15, 2025 03:04:09.888933897 CET50611445192.168.2.5195.82.36.1
                                Jan 15, 2025 03:04:09.889394999 CET50613445192.168.2.5195.82.36.1
                                Jan 15, 2025 03:04:09.894850016 CET44550611195.82.36.1192.168.2.5
                                Jan 15, 2025 03:04:09.894918919 CET50611445192.168.2.5195.82.36.1
                                Jan 15, 2025 03:04:09.895306110 CET44550613195.82.36.1192.168.2.5
                                Jan 15, 2025 03:04:09.895375013 CET50613445192.168.2.5195.82.36.1
                                Jan 15, 2025 03:04:09.895421028 CET50613445192.168.2.5195.82.36.1
                                Jan 15, 2025 03:04:09.900942087 CET44550613195.82.36.1192.168.2.5
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 15, 2025 03:02:02.886360884 CET5638253192.168.2.51.1.1.1
                                Jan 15, 2025 03:02:02.894834995 CET53563821.1.1.1192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jan 15, 2025 03:02:02.886360884 CET192.168.2.51.1.1.10x7e99Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jan 15, 2025 03:02:02.894834995 CET1.1.1.1192.168.2.50x7e99No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                Jan 15, 2025 03:02:02.894834995 CET1.1.1.1192.168.2.50x7e99No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.549704104.16.167.228801396C:\Windows\mssecsvc.exe
                                TimestampBytes transferredDirectionData
                                Jan 15, 2025 03:02:02.929512978 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 15, 2025 03:02:03.403279066 CET778INHTTP/1.1 200 OK
                                Date: Wed, 15 Jan 2025 02:02:03 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 9022480ad8f242c8-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.549705104.16.167.228805736C:\Windows\mssecsvc.exe
                                TimestampBytes transferredDirectionData
                                Jan 15, 2025 03:02:03.614990950 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 15, 2025 03:02:04.093827963 CET778INHTTP/1.1 200 OK
                                Date: Wed, 15 Jan 2025 02:02:04 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 9022480f2c1a182d-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.549726104.16.167.228802876C:\Windows\mssecsvc.exe
                                TimestampBytes transferredDirectionData
                                Jan 15, 2025 03:02:05.805573940 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 15, 2025 03:02:06.292109013 CET778INHTTP/1.1 200 OK
                                Date: Wed, 15 Jan 2025 02:02:06 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 9022481ceb1b8cc0-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Session IDSource IPSource PortDestination IPDestination Port
                                3192.168.2.550608104.16.167.22880
                                TimestampBytes transferredDirectionData
                                Jan 15, 2025 03:04:09.370990038 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 15, 2025 03:04:09.867110968 CET778INHTTP/1.1 200 OK
                                Date: Wed, 15 Jan 2025 02:04:09 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 90224b212c914216-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:21:02:01
                                Start date:14/01/2025
                                Path:C:\Windows\System32\loaddll32.exe
                                Wow64 process (32bit):true
                                Commandline:loaddll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll"
                                Imagebase:0xb50000
                                File size:126'464 bytes
                                MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:1
                                Start time:21:02:01
                                Start date:14/01/2025
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:21:02:01
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1
                                Imagebase:0x790000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:21:02:01
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\rundll32.exe
                                Wow64 process (32bit):true
                                Commandline:rundll32.exe C:\Users\user\Desktop\ue5QSYCBPt.dll,PlayGame
                                Imagebase:0x920000
                                File size:61'440 bytes
                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:21:02:01
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\rundll32.exe
                                Wow64 process (32bit):true
                                Commandline:rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",#1
                                Imagebase:0x920000
                                File size:61'440 bytes
                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:21:02:01
                                Start date:14/01/2025
                                Path:C:\Windows\mssecsvc.exe
                                Wow64 process (32bit):true
                                Commandline:C:\WINDOWS\mssecsvc.exe
                                Imagebase:0x400000
                                File size:3'723'264 bytes
                                MD5 hash:1CE39288B0A08B9E9EF9504FEBB99E0C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2067776497.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2067905523.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.2067905523.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                Reputation:low
                                Has exited:true

                                Target ID:7
                                Start time:21:02:02
                                Start date:14/01/2025
                                Path:C:\Windows\mssecsvc.exe
                                Wow64 process (32bit):true
                                Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                Imagebase:0x400000
                                File size:3'723'264 bytes
                                MD5 hash:1CE39288B0A08B9E9EF9504FEBB99E0C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2720112628.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2722276360.0000000001ECB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2722276360.0000000001ECB000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2075394682.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.2075394682.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2075228416.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2722631922.00000000023EB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2722631922.00000000023EB000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                Reputation:low
                                Has exited:true

                                Target ID:8
                                Start time:21:02:03
                                Start date:14/01/2025
                                Path:C:\Windows\tasksche.exe
                                Wow64 process (32bit):false
                                Commandline:C:\WINDOWS\tasksche.exe /i
                                Imagebase:0x400000
                                File size:3'514'368 bytes
                                MD5 hash:B050ED62458D7840747D691F5594009E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2087616134.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 93%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:9
                                Start time:21:02:04
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\rundll32.exe
                                Wow64 process (32bit):true
                                Commandline:rundll32.exe "C:\Users\user\Desktop\ue5QSYCBPt.dll",PlayGame
                                Imagebase:0x920000
                                File size:61'440 bytes
                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:10
                                Start time:21:02:04
                                Start date:14/01/2025
                                Path:C:\Windows\mssecsvc.exe
                                Wow64 process (32bit):true
                                Commandline:C:\WINDOWS\mssecsvc.exe
                                Imagebase:0x400000
                                File size:3'723'264 bytes
                                MD5 hash:1CE39288B0A08B9E9EF9504FEBB99E0C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2105613435.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2096475141.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2096661056.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.2096661056.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2105778009.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.2105778009.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                Reputation:low
                                Has exited:true

                                Target ID:11
                                Start time:21:02:05
                                Start date:14/01/2025
                                Path:C:\Windows\tasksche.exe
                                Wow64 process (32bit):false
                                Commandline:C:\WINDOWS\tasksche.exe /i
                                Imagebase:0x400000
                                File size:3'514'368 bytes
                                MD5 hash:B050ED62458D7840747D691F5594009E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.2104619942.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.2105076406.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                Reputation:low
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:71.8%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:64.9%
                                  Total number of Nodes:37
                                  Total number of Limit Nodes:9

                                  Callgraph

                                  Control-flow Graph

                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                  • sprintf.MSVCRT ref: 00407E01
                                  • sprintf.MSVCRT ref: 00407E18
                                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                  • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                  • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                  • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                  • CreateProcessA.KERNELBASE ref: 00407EE8
                                  • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                  • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2088602328.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000005.00000002.2088578186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088650454.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088722271.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                  • API String ID: 4281112323-1507730452
                                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2088602328.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000005.00000002.2088578186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088650454.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088722271.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                  • String ID:
                                  • API String ID: 801014965-0
                                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                  Control-flow Graph

                                  APIs
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                  Strings
                                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2088602328.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000005.00000002.2088578186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088650454.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088722271.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  • API String ID: 774561529-2942426231
                                  • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                  • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                  Control-flow Graph

                                  APIs
                                  • sprintf.MSVCRT ref: 00407C56
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2088602328.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000005.00000002.2088578186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088650454.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088722271.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                  • API String ID: 3340711343-4063779371
                                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • __p___argc.MSVCRT ref: 004080A5
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2088602328.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000005.00000002.2088578186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088650454.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088670977.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088722271.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000005.00000002.2088807760.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                  • String ID: mssecsvc2.0
                                  • API String ID: 4274534310-3729025388
                                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                  Execution Graph

                                  Execution Coverage:34.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:35
                                  Total number of Limit Nodes:2

                                  Callgraph

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • __p___argc.MSVCRT ref: 004080A5
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2719460211.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000007.00000002.2718893665.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2719690393.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720112628.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720129586.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720155204.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                  • String ID: mssecsvc2.0
                                  • API String ID: 4274534310-3729025388
                                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                  Control-flow Graph

                                  APIs
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                  Strings
                                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2719460211.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000007.00000002.2718893665.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2719690393.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720112628.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720129586.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720155204.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  • API String ID: 774561529-2942426231
                                  • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                  • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                  Control-flow Graph

                                  APIs
                                  • sprintf.MSVCRT ref: 00407C56
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2719460211.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000007.00000002.2718893665.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2719690393.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720112628.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720129586.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720155204.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                  • API String ID: 3340711343-4063779371
                                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                  • sprintf.MSVCRT ref: 00407E01
                                  • sprintf.MSVCRT ref: 00407E18
                                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2719460211.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000007.00000002.2718893665.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2719690393.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720112628.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720129586.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720155204.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                  • API String ID: 4072214828-1507730452
                                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2719460211.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000007.00000002.2718893665.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2719690393.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720002386.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720112628.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720129586.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720155204.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.2720687047.00000000008FD000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                  • String ID:
                                  • API String ID: 801014965-0
                                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                  APIs
                                  • memcpy.MSVCRT(000000FF,?,0000012C,?,00000000), ref: 00406C91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: memcpy
                                  • String ID: /../$/..\$\../$\..\
                                  • API String ID: 3510742995-3885502717
                                  • Opcode ID: 00491be41aa5427f31b8b9a32a9b57da7e2e6dff5cb5143b376a5dd6570fe62a
                                  • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                  • Opcode Fuzzy Hash: 00491be41aa5427f31b8b9a32a9b57da7e2e6dff5cb5143b376a5dd6570fe62a
                                  • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                  APIs
                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                  • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                  • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                  • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                  • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                  • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                  • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                  • API String ID: 2238633743-2459060434
                                  • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                  • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                  • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                  • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                  • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandleOpen$ManagerStart
                                  • String ID: cmd.exe /c "%s"
                                  • API String ID: 1485051382-955883872
                                  • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                  • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                  • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                  • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                  • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                  • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrow$memcpy
                                  • String ID:
                                  • API String ID: 1881450474-3916222277
                                  • Opcode ID: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                  • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                  • Opcode Fuzzy Hash: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                  • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                  APIs
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                  • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                  • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                  • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                  • String ID: 2!@$WANACRY!
                                  • API String ID: 283026544-2846199637
                                  • Opcode ID: 132a2296b2ff258622cfdc5610791c464188c2d7d3f69318739cc377377d902c
                                  • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                  • Opcode Fuzzy Hash: 132a2296b2ff258622cfdc5610791c464188c2d7d3f69318739cc377377d902c
                                  • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                  APIs
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                  • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                  • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                  • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                  • String ID: 2!@$WANACRY!
                                  • API String ID: 283026544-2846199637
                                  • Opcode ID: d9b1b6046084e2d9d8768fc4d8ac5865fa55d0fd0db9d64480dfd0594076ccd5
                                  • Instruction ID: 4f5db7b03fbae4bd1a74ba09c9783dfc14942441ffc150fb06ee42d3f2d97cbc
                                  • Opcode Fuzzy Hash: d9b1b6046084e2d9d8768fc4d8ac5865fa55d0fd0db9d64480dfd0594076ccd5
                                  • Instruction Fuzzy Hash: EF511C71901219AFDB219F95CD88BEEB7BCEB08380F1444BAF515F61A0D7399A45CF28
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                  • String ID: $Q;@
                                  • API String ID: 2382887404-262343263
                                  • Opcode ID: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                  • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                  • Opcode Fuzzy Hash: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                  • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                  • String ID:
                                  • API String ID: 2382887404-3916222277
                                  • Opcode ID: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                  • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                  • Opcode Fuzzy Hash: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                  • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                  APIs
                                  • free.MSVCRT(?,?,00000000,00000000,0040243C,00000000), ref: 00402A15
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                  • HeapFree.KERNEL32(00000000), ref: 00402A3D
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$FreeProcessfree
                                  • String ID:
                                  • API String ID: 3428986607-0
                                  • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                  • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                  • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                  • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrow
                                  • String ID:
                                  • API String ID: 941485209-0
                                  • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                  • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                  • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                  • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrow
                                  • String ID:
                                  • API String ID: 941485209-0
                                  • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                  • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                  • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                  • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: memcpy
                                  • String ID:
                                  • API String ID: 3510742995-0
                                  • Opcode ID: 71b96a770fe0ecad1357f1a23098f25de26b1f41743f28900a51c64cf9a44166
                                  • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                  • Opcode Fuzzy Hash: 71b96a770fe0ecad1357f1a23098f25de26b1f41743f28900a51c64cf9a44166
                                  • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                  APIs
                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ContextCryptRelease
                                  • String ID:
                                  • API String ID: 829835001-0
                                  • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                  • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                  • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                  • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                  • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                  • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                  • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                  • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                  • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                  • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                  APIs
                                    • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                  • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                  • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                  • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                  • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                  • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                  • API String ID: 2238633743-1294736154
                                  • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                  • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                  • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                  • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000208), ref: 0040201F
                                    • Part of subcall function 00401225: GetComputerNameW.KERNEL32(?,0000018F), ref: 0040125F
                                    • Part of subcall function 00401225: wcslen.MSVCRT(?), ref: 00401279
                                    • Part of subcall function 00401225: wcslen.MSVCRT(?), ref: 00401298
                                    • Part of subcall function 00401225: srand.MSVCRT(00000001), ref: 004012A1
                                    • Part of subcall function 00401225: rand.MSVCRT ref: 004012AE
                                    • Part of subcall function 00401225: rand.MSVCRT ref: 004012C0
                                    • Part of subcall function 00401225: rand.MSVCRT ref: 004012DD
                                  • __p___argc.MSVCRT ref: 00402030
                                  • __p___argv.MSVCRT(0040F538), ref: 00402040
                                  • strcmp.MSVCRT(?), ref: 0040204B
                                    • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                    • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                    • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                    • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                  • CopyFileA.KERNEL32(?,tasksche.exe,00000000), ref: 0040206F
                                  • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                    • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                  • strrchr.MSVCRT(?,0000005C), ref: 0040209D
                                  • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                  • SetCurrentDirectoryA.KERNEL32(?), ref: 004020BB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Namerand$AttributesDirectorystrrchrwcslen$ByteCharComputerCopyCurrentFullModuleMultiPathWideWindows__p___argc__p___argvsrandstrcmpswprintf
                                  • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                  • API String ID: 1102508541-2844324180
                                  • Opcode ID: fa07170e1e4a4f1b7f83228e29d312703e7eca5b79990a058ae1880847bcfca1
                                  • Instruction ID: 97633fc0405850e3ba211803acf8e340ff081048f6dba40907e2b9e4b27fb4f3
                                  • Opcode Fuzzy Hash: fa07170e1e4a4f1b7f83228e29d312703e7eca5b79990a058ae1880847bcfca1
                                  • Instruction Fuzzy Hash: 3741B472500359AEDB20A7B1DE49E9F376C9F10314F2005BFF645F61E2DE788D488A28
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: %s%s$%s%s%s$:$\
                                  • API String ID: 0-1100577047
                                  • Opcode ID: 4cc63effac65e5938d24d15cc637f4576a4bae754db62ced997f6066a9556017
                                  • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                  • Opcode Fuzzy Hash: 4cc63effac65e5938d24d15cc637f4576a4bae754db62ced997f6066a9556017
                                  • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                  APIs
                                  • wcscat.MSVCRT(?,WanaCrypt0r), ref: 0040114B
                                  • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                  • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                  • strlen.MSVCRT(?), ref: 004011A7
                                  • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                  • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                  • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                  • String ID: 0@$Software\$WanaCrypt0r
                                  • API String ID: 865909632-3421300005
                                  • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                  • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                  • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                  • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                  • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                  • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                  • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                  • String ID: %s\Intel$%s\ProgramData
                                  • API String ID: 3806094219-198707228
                                  • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                  • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                  • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                  • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                  APIs
                                  • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                  • __p__fmode.MSVCRT ref: 004077FC
                                  • __p__commode.MSVCRT ref: 0040780A
                                  • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                  • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                  • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                  • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                  • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                  • exit.MSVCRT(00000000), ref: 004078F2
                                  • _XcptFilter.MSVCRT(?,?), ref: 00407904
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                  • String ID:
                                  • API String ID: 801014965-0
                                  • Opcode ID: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                  • Instruction ID: b6807de3fe1c3e28ab0f2b8c021909998ac3013dced3884fb388c7f537fcd598
                                  • Opcode Fuzzy Hash: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                  • Instruction Fuzzy Hash: A34173B1C04344AFDB20AFA4DE49AA97BB8BF05310F20417FE581B72E1D7786845CB59
                                  APIs
                                    • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?,00000040,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402463
                                  • SetLastError.KERNEL32(000000C1,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402219
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402291
                                  • GetProcessHeap.KERNEL32(00000008,0000003C), ref: 00402313
                                  • HeapAlloc.KERNEL32(00000000), ref: 0040231A
                                  • memcpy.MSVCRT(00000000,?,?), ref: 004023A7
                                    • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?,?,00000000,00000000,?), ref: 004024D5
                                  • SetLastError.KERNEL32(0000045A), ref: 00402430
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                  • API String ID: 1900561814-192647395
                                  • Opcode ID: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                  • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                  • Opcode Fuzzy Hash: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                  • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                  APIs
                                  • FindResourceA.KERNEL32(?,0000080A,XIA), ref: 00401DC3
                                  • LoadResource.KERNEL32(?,00000000), ref: 00401DD3
                                  • LockResource.KERNEL32(00000000), ref: 00401DDE
                                  • SizeofResource.KERNEL32(?,00000000,?), ref: 00401DF1
                                  • strcmp.MSVCRT(?,c.wnry,00000000,00000000,00000000), ref: 00401E5B
                                  • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Resource$AttributesFileFindLoadLockSizeofstrcmp
                                  • String ID: XIA$c.wnry
                                  • API String ID: 1616299030-2505933848
                                  • Opcode ID: fa50258f105623fefeb72ee45be684de9f148c77f4537fdf01ad18e8f360a7dc
                                  • Instruction ID: c6e87d2598776ad3e20a4276f2cf7508875c12884426eb96d7428c940f8e6225
                                  • Opcode Fuzzy Hash: fa50258f105623fefeb72ee45be684de9f148c77f4537fdf01ad18e8f360a7dc
                                  • Instruction Fuzzy Hash: 93210332D001147ADB216631DC45FEF3A6C9F45360F1001B6FE48F21D1DB38DA998AE9
                                  APIs
                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                  • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                  • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                  • String ID: %s\%s
                                  • API String ID: 1036847564-4073750446
                                  • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                  • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                  • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                  • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                  • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                  • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                  • CloseHandle.KERNEL32(?), ref: 004010EC
                                  • CloseHandle.KERNEL32(?), ref: 004010F1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                  • String ID: D
                                  • API String ID: 786732093-2746444292
                                  • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                  • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                  • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                  • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: rand$wcslen$ComputerNamesrand
                                  • String ID:
                                  • API String ID: 3058258771-0
                                  • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                  • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                  • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                  • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                  APIs
                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00000000), ref: 00407083
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00407091
                                  • memcpy.MSVCRT(?,004073A3,004073A3,?,00000000,00000000), ref: 004070CA
                                  • strcpy.MSVCRT(00000000,00000000,00000000,00000000), ref: 004070FB
                                  • strcat.MSVCRT(00000000,004073A3,00000000,00000000), ref: 0040710A
                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00000000), ref: 00407118
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                  • String ID:
                                  • API String ID: 2935503933-0
                                  • Opcode ID: c1a765a30f049a6e983e84c7fcdc04c319bd997b8f8109f685edbec73173bf57
                                  • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                  • Opcode Fuzzy Hash: c1a765a30f049a6e983e84c7fcdc04c319bd997b8f8109f685edbec73173bf57
                                  • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                  APIs
                                  • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                  • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                  • Sleep.KERNEL32(000003E8), ref: 00401F40
                                  • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandleMutexOpenSleepsprintf
                                  • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                  • API String ID: 2780352083-2959021817
                                  • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                  • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                  • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                  • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                  • String ID:
                                  • API String ID: 2382887404-0
                                  • Opcode ID: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                  • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                  • Opcode Fuzzy Hash: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                  • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                  APIs
                                  • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                  • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                  • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                  • fclose.MSVCRT(00000000), ref: 00401058
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: fclosefopenfreadfwrite
                                  • String ID: c.wnry
                                  • API String ID: 4000964834-3240288721
                                  • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                  • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                  • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                  • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                  APIs
                                  • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?,004023F5,00000000), ref: 00402812
                                  • realloc.MSVCRT(85000001,317459C0,00000000), ref: 00402854
                                  • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Read$realloc
                                  • String ID:
                                  • API String ID: 1241503663-0
                                  • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                  • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                  • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                  • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                  APIs
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040193A
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040194A
                                  • GlobalAlloc.KERNEL32(00000000,00000000), ref: 00401964
                                  • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000), ref: 0040197D
                                  • _local_unwind2.MSVCRT(?,000000FF), ref: 004019A6
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                  • String ID:
                                  • API String ID: 2811923685-0
                                  • Opcode ID: 3fa06aadd2471a705e8128430a745042bdb722af5d61b5b79dd264e81bcff4b6
                                  • Instruction ID: 6e643f249040116b9fc09fba66d69f614d66e1f70caffd77d95453aa30823522
                                  • Opcode Fuzzy Hash: 3fa06aadd2471a705e8128430a745042bdb722af5d61b5b79dd264e81bcff4b6
                                  • Instruction Fuzzy Hash: B1216DB1905224AFCB219BA59D48BDF7E78EB097A0F14422BF415B22E0D7384845C7AC
                                  APIs
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,00000140,?,00406C12,?,00000000,00000001), ref: 00405BFE
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?), ref: 00405C29
                                  • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?,?,?), ref: 00405C38
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA), ref: 00405C8A
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Pointer$??2@Create
                                  • String ID:
                                  • API String ID: 1331958074-0
                                  • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                  • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                  • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                  • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                  APIs
                                  • GetCurrentDirectoryA.KERNEL32(00000104,00000140,00000000,00000000,00000000,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003), ref: 00406BB5
                                  • strlen.MSVCRT(00000140,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 00406BBC
                                  • strcat.MSVCRT(00000140,0040F818,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000), ref: 00406BD7
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00406BEE
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectoryFilePointerstrcatstrlen
                                  • String ID:
                                  • API String ID: 1952800545-0
                                  • Opcode ID: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                  • Instruction ID: 093f70e5e45cef0a0e83344fd40667ee43cd8b667dee5f3d4d1a5a93074d9648
                                  • Opcode Fuzzy Hash: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                  • Instruction Fuzzy Hash: 06112372004218AAFB305B28DD01BAB3368EB21720F21013FF592B91D0E778A9A2975D
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 004074A9
                                  • ??2@YAPAXI@Z.MSVCRT(00000244,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074B5
                                  • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074FF
                                    • Part of subcall function 00407527: strlen.MSVCRT(00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 0040754F
                                    • Part of subcall function 00407527: ??2@YAPAXI@Z.MSVCRT(00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 00407556
                                    • Part of subcall function 00407527: strcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00407563
                                  • ??2@YAPAXI@Z.MSVCRT(00000008,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 0040750B
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??2@$??3@H_prologstrcpystrlen
                                  • String ID:
                                  • API String ID: 1367312548-0
                                  • Opcode ID: a4ccc6bdab315bb6810547fd1e784a1e5bd6969783f5aead57b9b326a8da6d2d
                                  • Instruction ID: 24e2e141a7415e54cfde60e06bc6f84240982ef19f6b767edb42695c1fbc6ce5
                                  • Opcode Fuzzy Hash: a4ccc6bdab315bb6810547fd1e784a1e5bd6969783f5aead57b9b326a8da6d2d
                                  • Instruction Fuzzy Hash: C101D431D09111BBDB166F659C02B9E3EA0AF04764F10853FF806B76D1DB78AD00C69E
                                  APIs
                                  • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000), ref: 00405CB6
                                  • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000), ref: 00405CBD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??3@CloseHandle
                                  • String ID: $l@
                                  • API String ID: 3816424416-2140230165
                                  • Opcode ID: 695026124e8f63dae5928df1cfc53220c2aa5689ade8ebf819959d8fbb63d2b2
                                  • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                  • Opcode Fuzzy Hash: 695026124e8f63dae5928df1cfc53220c2aa5689ade8ebf819959d8fbb63d2b2
                                  • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                  • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2088062075.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2088047606.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088085155.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088103149.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000008.00000002.2088118946.00000000005ED000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$Leave$Entermemcpy
                                  • String ID:
                                  • API String ID: 3435569088-0
                                  • Opcode ID: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                  • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                  • Opcode Fuzzy Hash: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                  • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65