Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GeW4GzT8G8.dll

Overview

General Information

Sample name:GeW4GzT8G8.dll
renamed because original name is a hash value
Original sample name:78bd8b9c610315d7247e2076bbd9458c.dll
Analysis ID:1592021
MD5:78bd8b9c610315d7247e2076bbd9458c
SHA1:a8029cfe179dfc15c9a52ecd4ad491403dc1c1ae
SHA256:51d5805abb1d7fb68d037399193a5f1b019d23e455fe4a5b82d245a020b5b05b
Tags:dllexeuser-mentality
Infos:

Detection

Virut, Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to download HTTP data from a sinkholed server
Yara detected Virut
Yara detected Wannacry ransomware
AI detected suspicious sample
Changes memory attributes in foreign processes to executable or writable
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Creates files in the system32 config directory
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may execute only at specific dates)
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to evade debugger and weak emulator (self modifying code)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6288 cmdline: loaddll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3504 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5692 cmdline: rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 4432 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 80F63BEA8710636ED2F30EAD25E07C82)
          • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
          • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
          • svchost.exe (PID: 744 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • dllhost.exe (PID: 5628 cmdline: C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
          • fontdrvhost.exe (PID: 776 cmdline: "fontdrvhost.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F)
          • fontdrvhost.exe (PID: 784 cmdline: "fontdrvhost.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F)
          • svchost.exe (PID: 868 cmdline: C:\Windows\system32\svchost.exe -k RPCSS -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • dwm.exe (PID: 984 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
          • svchost.exe (PID: 1200 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1352 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1392 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1404 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1476 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1648 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1740 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1800 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 2012 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • rundll32.exe (PID: 5124 cmdline: rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5860 cmdline: rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 5568 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 80F63BEA8710636ED2F30EAD25E07C82)
  • mssecsvc.exe (PID: 1196 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 80F63BEA8710636ED2F30EAD25E07C82)
    • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 372 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 772 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 888 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 660 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1100 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1224 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1412 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1596 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1704 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1716 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1876 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 2020 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
GeW4GzT8G8.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    GeW4GzT8G8.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    GeW4GzT8G8.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        00000023.00000002.2720636903.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
          00000014.00000002.2719092458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
            0000000C.00000002.1693222311.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              0000001D.00000002.2718376405.000000007FFD0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
                0000000E.00000002.1868184392.000000007FFF0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
                  Click to see the 159 entries
                  SourceRuleDescriptionAuthorStrings
                  17.2.mssecsvc.exe.24f28c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  17.2.mssecsvc.exe.1fc7084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  12.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                    12.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                    • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                    • 0xf4d8:$x3: tasksche.exe
                    • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                    • 0xf52c:$x5: WNcry@2ol7
                    • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                    • 0xf42c:$s3: cmd.exe /c "%s"
                    • 0x41980:$s4: msg/m_portuguese.wnry
                    • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                    • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                    • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                    12.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                    • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                    • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                    Click to see the 114 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\WINDOWS\mssecsvc.exe, ParentImage: C:\Windows\mssecsvc.exe, ParentProcessId: 4432, ParentProcessName: mssecsvc.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, ProcessId: 744, ProcessName: svchost.exe
                    Source: Process startedAuthor: vburov: Data: Command: winlogon.exe, CommandLine: winlogon.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\winlogon.exe, NewProcessName: C:\Windows\System32\winlogon.exe, OriginalFileName: C:\Windows\System32\winlogon.exe, ParentCommandLine: C:\WINDOWS\mssecsvc.exe, ParentImage: C:\Windows\mssecsvc.exe, ParentProcessId: 4432, ParentProcessName: mssecsvc.exe, ProcessCommandLine: winlogon.exe, ProcessId: 556, ProcessName: winlogon.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:25.556934+010020127301A Network Trojan was detected192.168.2.8643201.1.1.153UDP
                    2025-01-15T16:58:17.011779+010020127301A Network Trojan was detected192.168.2.8617241.1.1.153UDP
                    2025-01-15T16:59:08.402519+010020127301A Network Trojan was detected192.168.2.8634091.1.1.153UDP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080806+010020315153Misc activity104.16.166.22880192.168.2.849704TCP
                    2025-01-15T16:57:29.210203+010020315153Misc activity104.16.167.22880192.168.2.849710TCP
                    2025-01-15T16:57:29.298854+010020315153Misc activity104.16.167.22880192.168.2.849711TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:15.577268+010020242911A Network Trojan was detected192.168.2.8637611.1.1.153UDP
                    2025-01-15T16:57:28.691144+010020242911A Network Trojan was detected192.168.2.8641821.1.1.153UDP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020242981A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020242981A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020242981A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020242991A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020242991A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020242991A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020243011A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020243011A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020243011A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010020243021A Network Trojan was detected192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010020243021A Network Trojan was detected192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010020243021A Network Trojan was detected192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:57:16.080006+010028033043Unknown Traffic192.168.2.849704104.16.166.22880TCP
                    2025-01-15T16:57:29.208532+010028033043Unknown Traffic192.168.2.849710104.16.167.22880TCP
                    2025-01-15T16:57:29.292333+010028033043Unknown Traffic192.168.2.849711104.16.167.22880TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-15T16:58:25.678068+010028115771A Network Trojan was detected1.1.1.153192.168.2.853292UDP
                    2025-01-15T16:58:48.953187+010028115771A Network Trojan was detected1.1.1.153192.168.2.861145UDP
                    2025-01-15T16:59:06.237534+010028115771A Network Trojan was detected1.1.1.153192.168.2.861597UDP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: GeW4GzT8G8.dllAvira: detected
                    Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
                    Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: W32/Virut.Gen
                    Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 95%
                    Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
                    Source: GeW4GzT8G8.dllReversingLabs: Detection: 94%
                    Source: GeW4GzT8G8.dllVirustotal: Detection: 75%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                    Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                    Source: GeW4GzT8G8.dllJoe Sandbox ML: detected

                    Exploits

                    barindex
                    Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                    Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                    Source: GeW4GzT8G8.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                    Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Diagnostics.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbx source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ~1.PDB @7_9)ux source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error3)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb04 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: mp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorV)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.8:64320 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.8:61724 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.8:63409 -> 1.1.1.1:53
                    Source: C:\Windows\System32\svchost.exeDomain query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:57:16 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90270f7f185d0f97-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:57:29 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90270fd10f070cb2-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:57:29 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90270fd19ef47cfc-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                    Source: unknownDNS traffic detected: query: oxuoxj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yuaame.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fofavv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: pvjita.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: aqziks.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uncjvy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uooqwj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: kqpejd.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: txsueo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eoylnw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nfieuq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ilo.brenz.pl replaycode: Server failure (2)
                    Source: unknownDNS traffic detected: query: wvonfn.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ttilzo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ryiyek.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ikebhe.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fjlfoj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hnwafy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oloroz.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vwfafe.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: itevsb.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: wiybwa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tiggay.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tcezwt.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ncyyfy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oljrbm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bnnjpj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: whmeca.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eafaww.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: njbjte.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: sgucuw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: wjaaae.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: azmakv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hycoja.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hiuznf.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ogykld.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qxvfaq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vssqzu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hsvhuy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oyewqz.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: rxtiio.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vgkebm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uulevy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bevtua.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: oegiuo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: orvwjv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mhmasr.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: iyqdfh.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: pduhba.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uzgscj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: epejsq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ant.trenz.pl replaycode: Server failure (2)
                    Source: unknownDNS traffic detected: query: izgyem.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: cmyayw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: sliweo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xfqora.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: aguuxw.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vixeeq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nnezan.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: akkujf.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: veokda.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eoauui.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: unclto.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: imjmns.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ttedws.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nitrjr.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: riyymn.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jutqhm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: euieic.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fsbczk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: lnwfpg.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: zjaxax.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: icvsob.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: iieiay.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qmfezv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: gyinfa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ljomqy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: wbqpcg.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: kyfjqk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nihrqy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yhnour.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: aioade.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xwowqk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: scbors.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tvmcoy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bzmigs.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: evvbut.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eahdry.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mpblhc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nfiyae.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ueohif.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jbkunk.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yntfrh.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: loauaa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uuruou.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vdxuni.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: sxsxzp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: afvqcy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ofulyt.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: snjiwm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jqjyrb.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qxkaoo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: fpzsfa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: hrospx.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yazpuo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: izacru.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: yjumyc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: bitcaa.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ukmeqc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mmazow.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ytvutb.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: csyyvl.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ybdvhs.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ekfpve.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uxwoff.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: chmtuj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jseegc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jidduv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dwqzxj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: efegei.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: pqrkoe.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: favteu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: rfiiyy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: rtkhyx.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: shooys.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ielyae.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: nthzgn.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jdbpht.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: onzpwq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dccqyp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qycyhq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ylotge.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: luuymi.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: jyxidj.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dkyyvp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ojnqpy.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: veuibo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: dwyvvs.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mgknby.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: gnyoiq.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xeuyzh.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xmkske.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uxumpp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uasnos.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: vdxosv.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tnwywt.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: eicsxp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ubumrx.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ybcflo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: iofiur.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qovfco.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: lnsrfu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xuuvfo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xkeubu.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uxuxpl.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ufpirp.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: kpxpnm.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: ueqfel.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: uayyyl.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: tytzka.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qudqik.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: audccc.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: qfqayo.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: izyqkd.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: xdkgwd.com replaycode: Name error (3)
                    Source: unknownDNS traffic detected: query: mizeex.com replaycode: Name error (3)
                    Source: global trafficTCP traffic: 192.168.2.8:61792 -> 1.1.1.1:53
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:63761 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:64182 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49711 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49704 -> 104.16.166.228:80
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49710 -> 104.16.167.228:80
                    Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49710
                    Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.8:49704
                    Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49711
                    Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.8:53292
                    Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.8:61145
                    Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.8:61597
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 88.198.69.43
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.4
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 203.228.45.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 209.135.205.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.223
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.232.135.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 112.84.177.245
                    Source: unknownTCP traffic detected without corresponding DNS query: 112.84.177.245
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD27A7 GetTempFileNameA,CreateFileA,InternetReadFile,WriteFile,CloseHandle,CreateProcessA,InternetCloseHandle,InternetCloseHandle,6_2_00AD27A7
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: Microsoft-Windows-LiveId%4Operational.evtx.27.drString found in binary or memory: http://Passport.NET/tb
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473262535.00000213BCE49000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473262535.00000213BCE49000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                    Source: lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                    Source: lsass.exe, 00000008.00000002.2750188287.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473505535.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: lsass.exe, 00000008.00000000.1473742432.00000213BD400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2753241698.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
                    Source: lsass.exe, 00000008.00000000.1473328651.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2747533073.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: dllhost.exe, 0000000E.00000003.1497676940.00000184B1510000.00000004.00000800.00020000.00000000.sdmp, V01.log.14.drString found in binary or memory: http://ocsp.digice
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473262535.00000213BCE49000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2758510692.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2755458169.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473874337.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.digicert.com0:
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.digicert.com0H
                    Source: lsass.exe, 00000008.00000003.1682122616.00000213BD59E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474761749.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2757569984.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.1654010092.00000213BD59C000.00000004.00000001.00020000.00000000.sdmp, dllhost.exe, 0000000E.00000003.1497676940.00000184B151D000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://ocsp.digicert.com0I
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.digicert.com0Q
                    Source: lsass.exe, 00000008.00000000.1474607649.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.msocsp.com0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocsp.msocsp.com0S
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://ocspx.digicert.com0E
                    Source: svchost.exe, 0000001A.00000002.2755459692.000001486A5B0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473328651.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2747533073.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
                    Source: lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: WebCacheV01.dat.14.drString found in binary or memory: http://www.digicert.com/CPS0~
                    Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000003.1638909218.0000000000B00000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2280369063.0000000000AEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/(
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/)
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000BDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/R
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/a
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hL
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D18000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2280369063.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com0
                    Source: mssecsvc.exe, 00000006.00000002.1709689615.000000000019D000.00000004.00000010.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1693037455.000000000019C000.00000004.00000010.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2279550385.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                    Source: svchost.exe, 00000022.00000000.1576769823.000001F173E83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LO
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                    Source: WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
                    Source: svchost.exe, 00000009.00000000.1487402449.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://az804205.vo.msecnd.net/
                    Source: svchost.exe, 00000009.00000000.1487402449.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://az804205.vo.msecnd.net/f
                    Source: svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://az815563.vo.msecnd.net/
                    Source: svchost.exe, 00000009.00000000.1487448821.00000138EDAA3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2771771623.00000138EDA5F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487356023.00000138EDA5F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772678046.00000138EDAA3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487402449.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2772308000.00000138EDA6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.onenote.net/livetile/?Language=
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                    Source: dllhost.exe, 0000000E.00000003.1497676940.00000184B1519000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEn
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-08-30-16/PreSignInSettingsConfig.json
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=13164f2a9ee6956f1439
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=b92552
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59
                    Source: svchost.exe, 00000009.00000002.2774950845.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487880092.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.cn/shellRESP
                    Source: svchost.exe, 00000009.00000002.2774950845.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487880092.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com/shell
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://www.digicert.com/CPS0
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000C41000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
                    Source: WebCacheV01.dat.14.drString found in binary or memory: https://www.office.com/
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50128
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50492 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61806
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61906
                    Source: unknownNetwork traffic detected: HTTP traffic on port 61806 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50193
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50492
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                    Source: unknownNetwork traffic detected: HTTP traffic on port 61906 -> 443

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: Yara matchFile source: GeW4GzT8G8.dll, type: SAMPLE
                    Source: Yara matchFile source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1693222311.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.1467969506.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1709919485.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2279802499.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.1507342095.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.1495917347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1196, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                    System Summary

                    barindex
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.24f28c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fc7084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_00AD05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD252F NtOpenSection,6_2_00AD252F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD116F LoadLibraryA,GetModuleHandleA,lstrcat,lstrcatW,CreateEventA,CreateFileMappingA,GetDriveTypeA,GetFileAttributesA,GetFileTime,GetModuleFileNameA,GetSystemTime,GetTempPathA,GetVersion,GetVersionExA,MapViewOfFile,SetEndOfFile,SetFileAttributesA,UnmapViewOfFile,WriteFile,LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD116F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD2574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,6_2_00AD2574
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD2477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,6_2_00AD2477
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD24AE lstrcpyW,lstrlenW,NtCreateSection,6_2_00AD24AE
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD33E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_00AD33E0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD1422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD1422
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_00AD3405
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD144A
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE333E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_7FE333E0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE305F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_7FE305F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE324AE lstrcpyW,lstrlenW,NtCreateSection,6_2_7FE324AE
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE32477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,6_2_7FE32477
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE32574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,6_2_7FE32574
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_7FE3144A
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE31422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_7FE31422
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3252F NtOpenSection,6_2_7FE3252F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_7FE3042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_7FE33405
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE433E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,12_2_7FE433E0
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE405F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,12_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE424AE lstrcpyW,lstrlenW,NtCreateSection,12_2_7FE424AE
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE42574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,12_2_7FE42574
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE42477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,12_2_7FE42477
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,12_2_7FE4144A
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE41422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,12_2_7FE41422
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,12_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4252F NtOpenSection,12_2_7FE4252F
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,12_2_7FE43405
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,17_2_00AA05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA252F NtOpenSection,17_2_00AA252F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,17_2_00AA042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA116F LoadLibraryA,GetModuleHandleA,lstrcat,lstrcatW,CreateEventA,CreateFileMappingA,GetDriveTypeA,GetFileAttributesA,GetFileTime,GetModuleFileNameA,GetSystemTime,GetTempPathA,GetVersion,GetVersionExA,MapViewOfFile,SetEndOfFile,SetFileAttributesA,UnmapViewOfFile,WriteFile,LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_00AA116F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA2477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,17_2_00AA2477
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA2574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,17_2_00AA2574
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA24AE lstrcpyW,lstrlenW,NtCreateSection,17_2_00AA24AE
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA33E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_00AA33E0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA1422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_00AA1422
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_00AA3405
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_00AA144A
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE433E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_7FE433E0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE405F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,17_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE424AE lstrcpyW,lstrlenW,NtCreateSection,17_2_7FE424AE
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE42574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,17_2_7FE42574
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE42477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,17_2_7FE42477
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_7FE4144A
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE41422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,17_2_7FE41422
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,17_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4252F NtOpenSection,17_2_7FE4252F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,17_2_7FE43405
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\Microsoft\Protect\S-1-5-18\User\c8310f0f-9ec7-4a2b-8c40-fbafee991f65Jump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD116F6_2_00AD116F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3CF06_2_00AD3CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD28C86_2_00AD28C8
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3CC26_2_00AD3CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3C3D6_2_00AD3C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D366_2_00AD3D36
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D1F6_2_00AD3D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D4B6_2_00AD3D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33CF06_2_7FE33CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33CC26_2_7FE33CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE328C86_2_7FE328C8
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE34C9E6_2_7FE34C9E
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33D4B6_2_7FE33D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33D366_2_7FE33D36
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33C3D6_2_7FE33C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE33D1F6_2_7FE33D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43CF012_2_7FE43CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43CC212_2_7FE43CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE428C812_2_7FE428C8
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE44C9E12_2_7FE44C9E
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43D4B12_2_7FE43D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43D3612_2_7FE43D36
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43C3D12_2_7FE43C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE43D1F12_2_7FE43D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA116F17_2_00AA116F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3CF017_2_00AA3CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA28C817_2_00AA28C8
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3CC217_2_00AA3CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3C3D17_2_00AA3C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3D3617_2_00AA3D36
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3D1F17_2_00AA3D1F
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA3D4B17_2_00AA3D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43CF017_2_7FE43CF0
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43CC217_2_7FE43CC2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE428C817_2_7FE428C8
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE44C9E17_2_7FE44C9E
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43D4B17_2_7FE43D4B
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43D3617_2_7FE43D36
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43C3D17_2_7FE43C3D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE43D1F17_2_7FE43D1F
                    Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                    Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                    Source: tasksche.exe.12.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                    Source: GeW4GzT8G8.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: GeW4GzT8G8.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.24f28c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fc7084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.252496c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.2501948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 12.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 12.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.1fd6104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.2501948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fd20a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.1ff9128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.1fc7084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.252496c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 12.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.24f28c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.1fd6104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: 17.2.mssecsvc.exe.24fd8e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                    Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                    Source: Security.evtx.27.drBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sysAud
                    Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.27.drBinary string: J\Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
                    Source: System.evtx.27.drBinary string: C:\Device\HarddiskVolume3al0
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeH**
                    Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.27.drBinary string: A\Device\HarddiskVolume3\Program Files\Mozilla Firefox\firefox.exe
                    Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.27.drBinary string: L\Device\HarddiskVolume3\Users\user\AppData\Local\Temp\JSAMSIProvider64.dll6\Device\HarddiskVolume3\Windows\System32\SIHClient.exe
                    Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.27.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    Source: Security.evtx.27.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.syss
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.27.drBinary string: >\Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sys
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: \Device\NetbiosSmb
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: System.evtx.27.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4
                    Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.27.drBinary string: T\Device\HarddiskVolume3\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: System.evtx.27.drBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: System.evtx.27.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.27.drBinary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: Microsoft-Windows-SMBServer%4Operational.evtx.27.drBinary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.27.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
                    Source: System.evtx.27.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4%%
                    Source: System.evtx.27.drBinary string: C:\Device\HarddiskVolume3irec`
                    Source: GeW4GzT8G8.dll, tasksche.exe.12.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                    Source: classification engineClassification label: mal100.rans.troj.expl.evad.winDLL@18/72@2/100
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_00AD05F2
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Protect\S-1-5-21-2246122658-3693405117-2476756634-1003\18607d1f-3e87-41d7-b006-51bfc17e9538Jump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6296:120:WilError_03
                    Source: GeW4GzT8G8.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGame
                    Source: GeW4GzT8G8.dllReversingLabs: Detection: 94%
                    Source: GeW4GzT8G8.dllVirustotal: Detection: 75%
                    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll"
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGame
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",PlayGame
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1Jump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGameJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",PlayGameJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1Jump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}Jump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: ngcpopkeysrv.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: devobj.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: pcpksp.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\System32\lsass.exeSection loaded: tbs.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: esent.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: GeW4GzT8G8.dllStatic file information: File size 5267459 > 1048576
                    Source: GeW4GzT8G8.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                    Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Diagnostics.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbx source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ~1.PDB @7_9)ux source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error3)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb04 source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: mp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorV)y source: svchost.exe, 00000018.00000002.2737701303.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1534945793.0000028A1AA40000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1534844506.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2736501628.0000028A1AA2A000.00000004.00000001.00020000.00000000.sdmp
                    Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\symsrv.dllp.pdb source: svchost.exe, 00000018.00000000.1535058474.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2738834921.0000028A1AA5D000.00000004.00000001.00020000.00000000.sdmp
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D36 LoadLibraryA,GetProcAddress,LoadLibraryA,GetTickCount,GetVolumeInformationA,GetModuleFileNameA,wsprintfA,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateEventA,socket,connect,GetVersionExA,wsprintfA,CreateThread,CloseHandle,GetTickCount,6_2_00AD3D36

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                    Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                    Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                    Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                    Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD41786_2_00AD4178
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE341786_2_7FE34178
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4417812_2_7FE44178
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA417817_2_00AA4178
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4417817_2_7FE44178
                    Source: C:\Windows\mssecsvc.exeEvasive API call chain: GetSystemTime,DecisionNodes,Sleepgraph_12-3973
                    Source: C:\Windows\mssecsvc.exeSpecial instruction interceptor: First address: A718D7 instructions caused by: Self-modifying code
                    Source: C:\Windows\mssecsvc.exeSpecial instruction interceptor: First address: A6B2E5 instructions caused by: Self-modifying code
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D rdtsc 6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                    Source: C:\Windows\mssecsvc.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                    Source: C:\Windows\mssecsvc.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_12-3973
                    Source: C:\Windows\mssecsvc.exeAPI coverage: 6.2 %
                    Source: C:\Windows\mssecsvc.exeAPI coverage: 0.3 %
                    Source: C:\Windows\mssecsvc.exeAPI coverage: 5.9 %
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4417817_2_7FE44178
                    Source: C:\Windows\mssecsvc.exe TID: 6592Thread sleep count: 89 > 30Jump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6592Thread sleep time: -178000s >= -30000sJump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6968Thread sleep count: 125 > 30Jump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6968Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Windows\mssecsvc.exe TID: 6592Thread sleep time: -86400000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                    Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                    Source: svchost.exe, 0000001B.00000000.1549814166.0000024BD362B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2749546037.0000024BD362B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmicheartbeat
                    Source: mssecsvc.exe, 00000011.00000002.2280369063.0000000000B09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh0|
                    Source: svchost.exe, 0000001B.00000000.1549862680.0000024BD3643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
                    Source: mssecsvc.exe, 00000011.00000002.2280369063.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8l
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: VMware SATA CD00
                    Source: svchost.exe, 00000017.00000000.1524144488.000002238202B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: NECVMWarVMware SATA CD00
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                    Source: mssecsvc.exe, 00000006.00000002.1710923691.0000000000C35000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1710923691.0000000000C06000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D71000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000000.1499329638.000001CD55600000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2786637408.000001CD55600000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2787499046.000001CD5562B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000000.1499405327.000001CD5562B000.00000004.00000001.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2280369063.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000003.1638909218.0000000000B09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.27.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
                    Source: svchost.exe, 0000001B.00000002.2747358780.0000024BD35D0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pVMwareVirtual disk6000c29198182f16b7176b0e680deba6
                    Source: dwm.exe, 00000012.00000000.1515747636.0000026DACB82000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
                    Source: System.evtx.27.drBinary or memory string: VMCI: Using capabilities (0x1c).
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: pVMwareVirtual disk6000c29198182f16b7176b0e680deba68
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
                    Source: mssecsvc.exe, 00000011.00000003.1638909218.0000000000B09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh1}
                    Source: svchost.exe, 00000009.00000002.2770718862.00000138EDA25000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: nonicNECVMWarVMware SATA CD00
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
                    Source: svchost.exe, 0000001B.00000000.1551024707.0000024BD5024000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmcir:m
                    Source: mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(<
                    Source: svchost.exe, 00000009.00000002.2770718862.00000138EDA25000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $@vmicshutdown
                    Source: svchost.exe, 0000001B.00000000.1550978406.0000024BD3FE2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
                    Source: Microsoft-Windows-Ntfs%4Operational.evtx.27.drBinary or memory string: VMware
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @vmicshutdown
                    Source: svchost.exe, 00000009.00000002.2770718862.00000138EDA25000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
                    Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.27.drBinary or memory string: VMware Virtual disk 2.0 6000c29198182f16b7176b0e680deba6PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: nonicVMware Virtual disk 6000c29198182f16b7176b0e680deba6
                    Source: svchost.exe, 00000009.00000002.2770929941.00000138EDA33000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: bfe2-06 @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: WebCacheV01.dat.14.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                    Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmicshutdown
                    Source: Microsoft-Windows-WER-PayloadHealth%4Operational.evtx.27.drBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: storahciNECVMWarVMware SATA CD00
                    Source: Microsoft-Windows-Partition%4Diagnostic.evtx.27.drBinary or memory string: VMwareVirtual disk2.06000c29198182f16b7176b0e680deba6PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
                    Source: svchost.exe, 0000001B.00000000.1550291143.0000024BD3C60000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 2ue).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
                    Source: lsass.exe, 00000008.00000000.1473215790.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2745366001.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1504826902.0000015870613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.2737709748.0000015870613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1516994559.000002C9AFC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000000.1518368642.000002C06F02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.2731126124.000002C06F02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.2744359671.0000022382041000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1524196197.0000022382041000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000000.1549814166.0000024BD362B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2749546037.0000024BD362B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: LSI_SASVMware Virtual disk 6000c29198182f16b7176b0e680deba6
                    Source: svchost.exe, 00000009.00000000.1486630702.00000138ED23A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $@vmicheartbeat
                    Source: svchost.exe, 00000025.00000000.1585753238.000001EC20C2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
                    Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.27.drBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
                    Source: svchost.exe, 00000010.00000002.2744929089.000001587066C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: svchost.exe, 00000023.00000000.1580190404.0000023314A02000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                    Source: lsass.exe, 00000008.00000002.2749131736.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
                    Source: svchost.exe, 0000001B.00000000.1556665864.0000024BD5A12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
                    Source: dwm.exe, 00000012.00000000.1515747636.0000026DACB82000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: C:\Windows\mssecsvc.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D rdtsc 6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3663A LdrInitializeThunk,6_2_7FE3663A
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD3D36 LoadLibraryA,GetProcAddress,LoadLibraryA,GetTickCount,GetVolumeInformationA,GetModuleFileNameA,wsprintfA,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateEventA,socket,connect,GetVersionExA,wsprintfA,CreateThread,CloseHandle,GetTickCount,6_2_00AD3D36
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD05F2 mov eax, dword ptr fs:[00000030h]6_2_00AD05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D mov eax, dword ptr fs:[00000030h]6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD025E mov edx, dword ptr fs:[00000030h]6_2_00AD025E
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE305F2 mov eax, dword ptr fs:[00000030h]6_2_7FE305F2
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3025E mov edx, dword ptr fs:[00000030h]6_2_7FE3025E
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_7FE3042D mov eax, dword ptr fs:[00000030h]6_2_7FE3042D
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE405F2 mov eax, dword ptr fs:[00000030h]12_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4025E mov edx, dword ptr fs:[00000030h]12_2_7FE4025E
                    Source: C:\Windows\mssecsvc.exeCode function: 12_2_7FE4042D mov eax, dword ptr fs:[00000030h]12_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA05F2 mov eax, dword ptr fs:[00000030h]17_2_00AA05F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA042D mov eax, dword ptr fs:[00000030h]17_2_00AA042D
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_00AA025E mov edx, dword ptr fs:[00000030h]17_2_00AA025E
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE405F2 mov eax, dword ptr fs:[00000030h]17_2_7FE405F2
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4025E mov edx, dword ptr fs:[00000030h]17_2_7FE4025E
                    Source: C:\Windows\mssecsvc.exeCode function: 17_2_7FE4042D mov eax, dword ptr fs:[00000030h]17_2_7FE4042D
                    Source: C:\Windows\mssecsvc.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\mssecsvc.exeProcess token adjusted: DebugJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\System32\svchost.exeDomain query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeThread created: unknown EIP: 7F5D3C38Jump to behavior
                    Source: C:\Windows\mssecsvc.exeThread created: unknown EIP: 7F5E3C38Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462FE0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462DC0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463620 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462F60 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463710 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462C00 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462FE0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462DC0 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463620 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462F60 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77463710 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: PID: 4084 base: 77462C00 value: E8Jump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\winlogon.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\lsass.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\dwm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tghtVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\winlogon.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\lsass.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\dwm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: unknown protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\mssecsvc.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\mssecsvc.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeSection loaded: \BaseNamedObjects\tputVt target: C:\Windows\System32\dllhost.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F30000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320F50000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1E320FB0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5960000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4AF0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD555A0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0BC0000Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462FE0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462DC0Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463620Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462F60Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77463710Jump to behavior
                    Source: C:\Windows\mssecsvc.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77462C00Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1Jump to behavior
                    Source: dwm.exe, 00000012.00000002.2784770464.0000026DAA594000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 00000012.00000000.1513674447.0000026DAA594000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
                    Source: winlogon.exe, 00000007.00000000.1470052390.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000002.2752534825.000002E991B70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000012.00000002.2790009501.0000026DAAB41000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD116F LoadLibraryA,GetModuleHandleA,lstrcat,lstrcatW,CreateEventA,CreateFileMappingA,GetDriveTypeA,GetFileAttributesA,GetFileTime,GetModuleFileNameA,GetSystemTime,GetTempPathA,GetVersion,GetVersionExA,MapViewOfFile,SetEndOfFile,SetFileAttributesA,UnmapViewOfFile,WriteFile,LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_00AD116F
                    Source: C:\Windows\mssecsvc.exeCode function: 6_2_00AD042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_00AD042D
                    Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.27.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000023.00000002.2720636903.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2719092458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718376405.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1868184392.000000007FFF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.1469139921.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280238468.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719581126.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2777494237.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000000.1579253830.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718396660.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.1551989723.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718267078.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000000.1562843216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000000.1520258438.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000000.1497422002.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718865273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.1513385761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710675304.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712970939.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2719553271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2720264639.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718953458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2718552816.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2719630248.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718375782.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2719418097.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000000.1584365051.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000000.1583741288.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719011781.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718548042.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2719776272.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2718214298.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.1504207342.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2718602569.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720101514.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000000.1556664324.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000000.1570640748.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2719011282.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588780357.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2719447551.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2720025241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2718553282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000000.1545080050.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718952875.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718656610.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2719064286.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000000.1571774510.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718712243.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718209391.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718895917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2719387016.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2719121091.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2718893631.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2720214040.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2777701008.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594507271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2719934656.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.1547825890.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588816089.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718545796.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2718556376.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000000.1492508014.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2718554809.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2777494761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000000.1507806969.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2777490892.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.1522321273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000000.1563869827.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718078909.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2718957847.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000000.1532350980.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.1472570641.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2718684916.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594553743.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718378800.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2719525179.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2719008114.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000000.1588961193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718657929.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718502180.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000000.1516012200.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720745515.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2720463440.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.1517859323.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718374412.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718205451.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2777847193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2719199540.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2719360325.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000000.1495914379.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718655372.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2777706559.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000000.1594740605.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2719250523.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000000.1573456651.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.2720028033.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000000.1546866705.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.1483800032.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2718814793.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: winlogon.exe PID: 556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 640, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 784, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dllhost.exe PID: 5628, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 868, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1196, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 984, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 364, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 372, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 772, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 660, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1100, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1200, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1224, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1412, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1648, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1716, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1876, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2020, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 17.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000023.00000002.2720636903.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2719092458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718376405.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1868184392.000000007FFF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000000.1469139921.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280238468.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719581126.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2777494237.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000000.1579253830.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718396660.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.1551989723.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718267078.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000000.1562843216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000000.1520258438.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000000.1497422002.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2718865273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.1513385761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710675304.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1712970939.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2719553271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2720264639.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718953458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2718552816.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2719630248.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718375782.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2719418097.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000000.1584365051.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000000.1583741288.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.2719011781.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718548042.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2719776272.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2718214298.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.1504207342.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2718602569.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720101514.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000000.1556664324.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000000.1570640748.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000025.00000002.2719011282.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588780357.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2719447551.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2720025241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2718553282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000000.1545080050.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000024.00000002.2718952875.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2718656610.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2719064286.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000000.1571774510.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718712243.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2718209391.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718895917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2719387016.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2719121091.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.2718893631.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2720214040.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.2777701008.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594507271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2719934656.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.1547825890.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000000.1588816089.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000021.00000002.2718545796.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000026.00000002.2718556376.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000000.1492508014.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2718554809.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2777494761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000000.1507806969.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000002.2777490892.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000000.1522321273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000000.1563869827.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718078909.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2718957847.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000000.1532350980.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.1472570641.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2718684916.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000000.1594553743.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.2718378800.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2719525179.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000002.2719008114.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000000.1588961193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001D.00000002.2718657929.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000020.00000002.2718502180.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000000.1516012200.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000027.00000002.2720745515.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.2720463440.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.1517859323.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718374412.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2718205451.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2777847193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2719199540.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2719360325.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000000.1495914379.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001F.00000002.2718655372.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000028.00000002.2777706559.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000029.00000000.1594740605.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2719250523.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000022.00000000.1573456651.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.2720028033.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000000.1546866705.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000000.1483800032.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2718814793.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: winlogon.exe PID: 556, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 640, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 776, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 784, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dllhost.exe PID: 5628, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 868, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1196, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 984, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 364, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 372, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 772, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 660, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1100, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1200, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1224, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1392, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1404, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1412, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1476, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1648, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1716, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1876, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2020, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    612
                    Process Injection
                    221
                    Masquerading
                    OS Credential Dumping1
                    Network Share Discovery
                    Remote Services1
                    Archive Collected Data
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Modify Registry
                    LSASS Memory11
                    System Time Discovery
                    Remote Desktop ProtocolData from Removable Media12
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                    Virtualization/Sandbox Evasion
                    Security Account Manager351
                    Security Software Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook612
                    Process Injection
                    NTDS41
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture3
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Install Root Certificate
                    LSA Secrets3
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Rundll32
                    Cached Domain Credentials124
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592021 Sample: GeW4GzT8G8.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 65 euieic.com 2->65 67 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->67 75 Tries to download HTTP data from a sinkholed server 2->75 77 Suricata IDS alerts for network traffic 2->77 79 Malicious sample detected (through community Yara rule) 2->79 83 9 other signatures 2->83 11 loaddll32.exe 1 2->11         started        13 mssecsvc.exe 2->13         started        signatures3 81 Tries to resolve many domain names, but no domain seems valid 65->81 process4 dnsIp5 17 cmd.exe 1 11->17         started        19 rundll32.exe 11->19         started        22 rundll32.exe 1 11->22         started        25 conhost.exe 11->25         started        69 192.168.2.100 unknown unknown 13->69 71 192.168.2.102 unknown unknown 13->71 73 98 other IPs or domains 13->73 105 Connects to many different private IPs via SMB (likely to spread or exploit) 13->105 107 Connects to many different private IPs (likely to spread or exploit) 13->107 109 Changes memory attributes in foreign processes to executable or writable 13->109 111 4 other signatures 13->111 27 svchost.exe 13->27 injected 29 svchost.exe 13->29 injected 31 svchost.exe 13->31 injected 33 11 other processes 13->33 signatures6 process7 file8 35 rundll32.exe 17->35         started        85 Drops executables to the windows directory (C:\Windows) and starts them 19->85 37 mssecsvc.exe 7 19->37         started        57 C:\Windows\mssecsvc.exe, PE32 22->57 dropped signatures9 process10 file11 40 mssecsvc.exe 7 35->40         started        55 C:\Windows\tasksche.exe, PE32 37->55 dropped process12 signatures13 87 Antivirus detection for dropped file 40->87 89 Multi AV Scanner detection for dropped file 40->89 91 Machine Learning detection for dropped file 40->91 93 8 other signatures 40->93 43 lsass.exe 14 40->43 injected 46 svchost.exe 3 40->46 injected 48 svchost.exe 40->48 injected 51 14 other processes 40->51 process14 dnsIp15 95 Installs new ROOT certificates 43->95 97 Creates files in the system32 config directory 43->97 99 Writes to foreign memory regions 43->99 101 System process connects to network (likely due to code injection or exploit) 46->101 53 dllhost.exe 7 46->53         started        59 zjaxax.com 48->59 61 yuaame.com 48->61 63 160 other IPs or domains 48->63 signatures16 103 Tries to resolve many domain names, but no domain seems valid 61->103 process17

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    GeW4GzT8G8.dll95%ReversingLabsWin32.Ransomware.WannaCry
                    GeW4GzT8G8.dll76%VirustotalBrowse
                    GeW4GzT8G8.dll100%AviraW32/Virut.Gen
                    GeW4GzT8G8.dll100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Windows\tasksche.exe100%AviraTR/AD.WannaCry.sewvt
                    C:\Windows\mssecsvc.exe100%AviraW32/Virut.Gen
                    C:\Windows\tasksche.exe100%Joe Sandbox ML
                    C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                    C:\Windows\mssecsvc.exe96%ReversingLabsWin32.Ransomware.WannaCry
                    C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c30%Avira URL Cloudsafe
                    https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd0%Avira URL Cloudsafe
                    https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc80%Avira URL Cloudsafe
                    http://ocsp.digice0%Avira URL Cloudsafe
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com00%Avira URL Cloudsafe
                    https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be7170%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                    104.16.166.228
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Rmssecsvc.exe, 00000006.00000002.1710923691.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.office.com/WebCacheV01.dat.14.drfalse
                            high
                            https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LOWebCacheV01.dat.14.drfalse
                              high
                              https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3WebCacheV01.dat.14.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com0mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D18000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2280369063.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://windows.msn.com/shellsvchost.exe, 00000009.00000002.2774950845.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487880092.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      https://aefd.nelreports.net/api/report?cat=bingthWebCacheV01.dat.14.drfalse
                                        high
                                        https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59WebCacheV01.dat.14.drfalse
                                          high
                                          https://aefd.nelreports.net/api/report?cat=wsbWebCacheV01.dat.14.drfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              https://aefd.nelreports.net/api/report?cat=bingaotakWebCacheV01.dat.14.drfalse
                                                high
                                                https://deff.nelreports.net/api/report?cat=msndllhost.exe, 0000000E.00000003.1497676940.00000184B1519000.00000004.00000800.00020000.00000000.sdmp, WebCacheV01.dat.14.dr, V01.log.14.drfalse
                                                  high
                                                  http://schemas.microsvchost.exe, 0000001A.00000002.2755459692.000001486A5B0000.00000002.00000001.00040000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.digicedllhost.exe, 0000000E.00000003.1497676940.00000184B1510000.00000004.00000800.00020000.00000000.sdmp, V01.log.14.drfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.4.drfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1473328651.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2747533073.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEnWebCacheV01.dat.14.drfalse
                                                          high
                                                          http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aefd.nelreports.net/api/report?cat=bingaotWebCacheV01.dat.14.drfalse
                                                              high
                                                              https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717WebCacheV01.dat.14.drfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/(mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/)mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platWebCacheV01.dat.14.drfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/hLmssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269WebCacheV01.dat.14.drfalse
                                                                          high
                                                                          https://windows.msn.cn/shellRESPsvchost.exe, 00000009.00000002.2774950845.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1487880092.00000138EDB2D000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgWebCacheV01.dat.14.drfalse
                                                                              high
                                                                              https://www.kryptoslogic.commssecsvc.exe, 00000006.00000002.1710923691.0000000000C41000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96ddWebCacheV01.dat.14.drfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://aefd.nelreports.net/api/report?cat=bingrmsWebCacheV01.dat.14.drfalse
                                                                                  high
                                                                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/amssecsvc.exe, 0000000C.00000002.1694346996.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8WebCacheV01.dat.14.drfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://Passport.NET/tbMicrosoft-Windows-LiveId%4Operational.evtx.27.drfalse
                                                                                      high
                                                                                      http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000008.00000000.1473328651.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2747533073.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000008.00000000.1473262535.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2746096112.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000006.00000002.1710923691.0000000000BDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000006.00000002.1709689615.000000000019D000.00000004.00000010.00020000.00000000.sdmp, mssecsvc.exe, 0000000C.00000002.1693037455.000000000019C000.00000004.00000010.00020000.00000000.sdmp, mssecsvc.exe, 00000011.00000002.2279550385.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&WebCacheV01.dat.14.drfalse
                                                                                                high
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                209.207.4.1
                                                                                                unknownUnited States
                                                                                                19108SUDDENLINK-COMMUNICATIONSUSfalse
                                                                                                88.63.225.1
                                                                                                unknownItaly
                                                                                                3269ASN-IBSNAZITfalse
                                                                                                176.122.86.146
                                                                                                unknownKazakhstan
                                                                                                59443BAYNUR-ASKZfalse
                                                                                                198.232.135.223
                                                                                                unknownUnited States
                                                                                                292ESNET-WESTUSfalse
                                                                                                91.57.194.1
                                                                                                unknownGermany
                                                                                                3320DTAGInternetserviceprovideroperationsDEfalse
                                                                                                51.20.135.12
                                                                                                unknownUnited States
                                                                                                2686ATGS-MMD-ASUSfalse
                                                                                                46.252.194.170
                                                                                                unknownGermany
                                                                                                21501GODADDY-AMSDEfalse
                                                                                                8.188.251.1
                                                                                                unknownSingapore
                                                                                                37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                                                                                122.230.196.1
                                                                                                unknownChina
                                                                                                134771CHINATELECOM-ZHEJIANG-WENZHOU-IDCWENZHOUZHEJIANGProvincefalse
                                                                                                8.188.251.4
                                                                                                unknownSingapore
                                                                                                37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                                                                                91.57.194.122
                                                                                                unknownGermany
                                                                                                3320DTAGInternetserviceprovideroperationsDEfalse
                                                                                                69.111.126.153
                                                                                                unknownUnited States
                                                                                                7018ATT-INTERNET4USfalse
                                                                                                9.166.247.19
                                                                                                unknownUnited States
                                                                                                3356LEVEL3USfalse
                                                                                                75.165.172.1
                                                                                                unknownUnited States
                                                                                                209CENTURYLINK-US-LEGACY-QWESTUSfalse
                                                                                                75.165.172.2
                                                                                                unknownUnited States
                                                                                                209CENTURYLINK-US-LEGACY-QWESTUSfalse
                                                                                                122.230.196.134
                                                                                                unknownChina
                                                                                                134771CHINATELECOM-ZHEJIANG-WENZHOU-IDCWENZHOUZHEJIANGProvincefalse
                                                                                                51.20.135.1
                                                                                                unknownUnited States
                                                                                                2686ATGS-MMD-ASUSfalse
                                                                                                201.202.46.2
                                                                                                unknownCosta Rica
                                                                                                11830InstitutoCostarricensedeElectricidadyTelecomCRfalse
                                                                                                IP
                                                                                                192.168.2.148
                                                                                                192.168.2.149
                                                                                                192.168.2.146
                                                                                                192.168.2.147
                                                                                                192.168.2.140
                                                                                                192.168.2.141
                                                                                                192.168.2.144
                                                                                                192.168.2.145
                                                                                                192.168.2.142
                                                                                                192.168.2.143
                                                                                                192.168.2.159
                                                                                                192.168.2.157
                                                                                                192.168.2.158
                                                                                                192.168.2.151
                                                                                                192.168.2.152
                                                                                                192.168.2.150
                                                                                                192.168.2.155
                                                                                                192.168.2.156
                                                                                                192.168.2.153
                                                                                                192.168.2.154
                                                                                                192.168.2.126
                                                                                                192.168.2.247
                                                                                                192.168.2.127
                                                                                                192.168.2.248
                                                                                                192.168.2.124
                                                                                                192.168.2.245
                                                                                                192.168.2.125
                                                                                                192.168.2.246
                                                                                                192.168.2.128
                                                                                                192.168.2.249
                                                                                                192.168.2.129
                                                                                                192.168.2.240
                                                                                                192.168.2.122
                                                                                                192.168.2.243
                                                                                                192.168.2.123
                                                                                                192.168.2.244
                                                                                                192.168.2.120
                                                                                                192.168.2.241
                                                                                                192.168.2.121
                                                                                                192.168.2.242
                                                                                                192.168.2.97
                                                                                                192.168.2.137
                                                                                                192.168.2.96
                                                                                                192.168.2.138
                                                                                                192.168.2.99
                                                                                                192.168.2.135
                                                                                                192.168.2.98
                                                                                                192.168.2.136
                                                                                                192.168.2.139
                                                                                                192.168.2.250
                                                                                                192.168.2.130
                                                                                                192.168.2.251
                                                                                                192.168.2.91
                                                                                                192.168.2.90
                                                                                                192.168.2.93
                                                                                                192.168.2.133
                                                                                                192.168.2.254
                                                                                                192.168.2.92
                                                                                                192.168.2.134
                                                                                                192.168.2.95
                                                                                                192.168.2.131
                                                                                                192.168.2.252
                                                                                                192.168.2.94
                                                                                                192.168.2.132
                                                                                                192.168.2.253
                                                                                                192.168.2.104
                                                                                                192.168.2.225
                                                                                                192.168.2.105
                                                                                                192.168.2.226
                                                                                                192.168.2.102
                                                                                                192.168.2.223
                                                                                                192.168.2.103
                                                                                                192.168.2.224
                                                                                                192.168.2.108
                                                                                                192.168.2.229
                                                                                                192.168.2.109
                                                                                                192.168.2.106
                                                                                                192.168.2.227
                                                                                                192.168.2.107
                                                                                                192.168.2.228
                                                                                                192.168.2.100
                                                                                                192.168.2.221
                                                                                                Joe Sandbox version:42.0.0 Malachite
                                                                                                Analysis ID:1592021
                                                                                                Start date and time:2025-01-15 16:56:10 +01:00
                                                                                                Joe Sandbox product:CloudBasic
                                                                                                Overall analysis duration:0h 8m 50s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:full
                                                                                                Cookbook file name:default.jbs
                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                Number of analysed new started processes analysed:11
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:31
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Sample name:GeW4GzT8G8.dll
                                                                                                renamed because original name is a hash value
                                                                                                Original Sample Name:78bd8b9c610315d7247e2076bbd9458c.dll
                                                                                                Detection:MAL
                                                                                                Classification:mal100.rans.troj.expl.evad.winDLL@18/72@2/100
                                                                                                EGA Information:
                                                                                                • Successful, ratio: 100%
                                                                                                HCA Information:Failed
                                                                                                Cookbook Comments:
                                                                                                • Found application associated with file extension: .dll
                                                                                                • Exclude process from analysis (whitelisted): dllhost.exe
                                                                                                • Excluded IPs from analysis (whitelisted): 2.22.50.144, 2.23.77.188, 217.20.57.35, 20.109.210.53, 40.126.32.134, 104.208.16.94, 13.107.246.45
                                                                                                • Excluded domains from analysis (whitelisted): aioade.com, dccqyp.com, lietra.com, uzgscj.com, fjlfoj.com, pqrkoe.com, qxkaoo.com, ufpirp.com, eicsxp.com, izacru.com, csyyvl.com, tytzka.com, xfqora.com, vdxosv.com, favteu.com, ubumrx.com, dwyvvs.com, efegei.com, ojnqpy.com, ljomqy.com, bitcaa.com, eafaww.com, xmkske.com, epejsq.com, riyymn.com, lnsrfu.com, xwowqk.com, uxwoff.com, rxtiio.com, bnnjpj.com, pvjita.com, qfqayo.com, nihrqy.com, iieiay.com, uxuxpl.com, korubi.com, hsvhuy.com, uxumpp.com, kyfjqk.com, wiybwa.com, veuibo.com, ryiyek.com, aguuxw.com, qxvfaq.com, ueohif.com, fofavv.com, bzmigs.com, ofulyt.com, yjumyc.com, sxsxzp.com, xuuvfo.com, jseegc.com, oljrbm.com, izgyem.com, qycyhq.com, loauaa.com, izyqkd.com, vgkebm.com, icvsob.com, jbkunk.com, sgucuw.com, yuaame.com, vdxuni.com, imjmns.com, whmeca.com, ylotge.com, uuruou.com, orvwjv.com, vwfafe.com, euieic.com, scbors.com, odogwa.com, otelrules.azureedge.net, ant.trenz.pl, mhmasr.com, oloroz.com, eahdry.com, yazpuo.com, fe3cr.delivery.mp.microsoft
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                                                                                TimeTypeDescription
                                                                                                10:57:14API Interceptor1x Sleep call for process: dllhost.exe modified
                                                                                                10:57:14API Interceptor1x Sleep call for process: loaddll32.exe modified
                                                                                                10:58:02API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                                                                                No context
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJRTn7b1kHg.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.166.228
                                                                                                alN48K3xcD.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                XB6SkLK7Al.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                                                                                • 104.16.167.228
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                ESNET-WESTUSxd.arm.elfGet hashmaliciousMiraiBrowse
                                                                                                • 198.130.12.18
                                                                                                miori.mips.elfGet hashmaliciousUnknownBrowse
                                                                                                • 198.230.94.67
                                                                                                sora.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                • 198.198.139.235
                                                                                                Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                                                                                                • 198.232.208.252
                                                                                                splspc.elfGet hashmaliciousUnknownBrowse
                                                                                                • 198.137.125.163
                                                                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                                                                • 198.128.208.210
                                                                                                arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                • 198.193.165.226
                                                                                                mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                • 198.230.192.201
                                                                                                la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                                                                • 198.225.7.245
                                                                                                sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                • 198.198.79.137
                                                                                                ASN-IBSNAZITbot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                                                • 80.117.234.116
                                                                                                bot.mips.elfGet hashmaliciousUnknownBrowse
                                                                                                • 95.245.119.173
                                                                                                bot.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                • 95.239.40.44
                                                                                                i686.elfGet hashmaliciousMiraiBrowse
                                                                                                • 62.211.75.113
                                                                                                arm5.elfGet hashmaliciousMiraiBrowse
                                                                                                • 5.99.130.226
                                                                                                i486.elfGet hashmaliciousMiraiBrowse
                                                                                                • 88.63.159.198
                                                                                                xd.mips.elfGet hashmaliciousMiraiBrowse
                                                                                                • 87.1.127.203
                                                                                                xd.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                • 94.84.7.125
                                                                                                sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.246.33.157
                                                                                                xd.spc.elfGet hashmaliciousMiraiBrowse
                                                                                                • 85.32.203.253
                                                                                                BAYNUR-ASKZJosho.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                • 95.182.11.38
                                                                                                EN36clwqq9.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.27
                                                                                                TWHPzbbhtF.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.35
                                                                                                05w3hcoTlb.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.13
                                                                                                PkQB1rE5kK.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.41
                                                                                                GpqAAlRMz4.elfGet hashmaliciousMoobotBrowse
                                                                                                • 95.182.11.45
                                                                                                b3astmode.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.16
                                                                                                wuka9aK727.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.31
                                                                                                HKZqB954AC.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.14
                                                                                                DUGEn9I0cO.elfGet hashmaliciousMiraiBrowse
                                                                                                • 95.182.11.26
                                                                                                SUDDENLINK-COMMUNICATIONSUSbot.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                • 24.32.186.78
                                                                                                m68k.elfGet hashmaliciousMiraiBrowse
                                                                                                • 75.108.75.213
                                                                                                6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                                                                                • 74.197.101.1
                                                                                                meth1.elfGet hashmaliciousMiraiBrowse
                                                                                                • 47.222.230.125
                                                                                                arm4.elfGet hashmaliciousUnknownBrowse
                                                                                                • 173.217.238.165
                                                                                                6.elfGet hashmaliciousUnknownBrowse
                                                                                                • 75.109.54.232
                                                                                                res.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                • 47.215.241.41
                                                                                                armv6l.elfGet hashmaliciousUnknownBrowse
                                                                                                • 47.220.169.215
                                                                                                5.elfGet hashmaliciousUnknownBrowse
                                                                                                • 74.225.230.170
                                                                                                Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                • 74.249.51.157
                                                                                                No context
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                C:\Windows\tasksche.exeJRTn7b1kHg.dllGet hashmaliciousWannacryBrowse
                                                                                                  S8LDvVdtOk.dllGet hashmaliciousWannacryBrowse
                                                                                                    9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                                                                                      zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                                                                                        zyeX8bTkky.dllGet hashmaliciousWannacryBrowse
                                                                                                          qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                                                                                            1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                                                                                              qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                                                                                                stN592INV6.exeGet hashmaliciousWannacryBrowse
                                                                                                                  onq54JS79W.exeGet hashmaliciousWannacryBrowse
                                                                                                                    Process:C:\Windows\System32\lsass.exe
                                                                                                                    File Type:data
                                                                                                                    Category:modified
                                                                                                                    Size (bytes):11136
                                                                                                                    Entropy (8bit):7.979922100942834
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:vn0RVUXNUsDcennrfNpCwAlx5467nB0FBYenIqDF6OZ+7fpiWztEC8lLEbiE7C:qODnhwt3J76/YeIqh6ZzpHzt46iV
                                                                                                                    MD5:97FC0449C036FE995D9B6E11A1CB1277
                                                                                                                    SHA1:27DFC7B1B1FE1C267B9C39CACAE39E84EF1839AE
                                                                                                                    SHA-256:33535D4D4F581D250408F60B7AF376009314AD83AA100367F224DFBEA3302CC8
                                                                                                                    SHA-512:546B24C4DBE78AA5DCBC1B08028049FBDA448D9B472444A1B461A4770D93E3E9D89E9179E0BF9E4D0608A6292FA53AE9AE36DE2EE225A60EF1320D99E6E6C0A5
                                                                                                                    Malicious:false
                                                                                                                    Preview:....t+..................z..O.......}`..>.A..Q..~.8... 0...L.o.c.a.l. .C.r.e.d.e.n.t.i.a.l. .D.a.t.a........f...... ....O.6......34i..C..=.....k|..3............. ...X:..Y.......;.....Xd...w>.....p*..1. De..x.JA.Fs.'....w......C..iMM...L(1.5Vl.Dx,.W...](..C.}^.`.7SE_............e..!N].....94V.X...L3j.js.?7j.+.0..p..X8...0.C........A.K}...J9......k.....&H..6i~....(...E...1s`...W..=.....`.s....]~...~..!<.ir8......S:...B.b:....j.<."C.uk...<4....F].,{+w.......,..\*.J..OFB.......C........V.....-..<d}L6c..L..... m.X.v..h.....7....dkiR..,.....KTPt.....7.......G.pP...z.K...i.B.(.\A...|l.K...B.T.k.......C..8.. {@)/ok..:../...W.. ...\.....Z.)...T.*...s).]5.|.(S........8....Y.Z..y..Z.U.-.\..`.>[....._.ll.Y.wqH...q4lH.Z;.....q....T......k.5..2_.. ..O......a.&V.........l.z._X ..W3}.g.Jl.1p..&...:.......\...u(.$.-.......;.....AC..r.......2.P1... ..bC.......1*.(..b:&....C...A8.z.....+...85.5hD.....}...9...P...\j:..n..)..a.._..[.....k=F..1&S*........6....
                                                                                                                    Process:C:\Windows\System32\lsass.exe
                                                                                                                    File Type:very short file (no magic)
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1
                                                                                                                    Entropy (8bit):0.0
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3::
                                                                                                                    MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                                                                    SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                                                                    SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                                                                    SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                                                                    Malicious:false
                                                                                                                    Preview:.
                                                                                                                    Process:C:\Windows\System32\dllhost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):8192
                                                                                                                    Entropy (8bit):0.41872441095459234
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:VWterYeVHrYeVnQ/8WterYeVHrYeVnQ/:brYeVHrYeVnI6rYeVHrYeVnI
                                                                                                                    MD5:9BBEAAA281CB65FF1C722C84390DC958
                                                                                                                    SHA1:9250D880C886C1B39001146A96AF26A84F26B233
                                                                                                                    SHA-256:B2CB74124F3216DB356C256CBDAEBB3D2D2DBF23A48967F800240729EC0DDDE8
                                                                                                                    SHA-512:A5C42E5972987C79C897B3FD41E817EE497FF260DE0D7C947B426B922DB11B76E974675B8F6152A7053F1566AAB705B38B3AA432B57339768E6EB4F322B0AC11
                                                                                                                    Malicious:false
                                                                                                                    Preview:...b................0s......{..................C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\............................................................................................................................................................................................................C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\.............................................................................................................................................................................................................0u...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    Process:C:\Windows\System32\dllhost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):524288
                                                                                                                    Entropy (8bit):0.8766678894591179
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:c9qZKjZGzLmi4KEsezzN4q10Gss8J5vyCIfywotxUfl4Ck7P:c9UWGvT4qqLszFIuYY
                                                                                                                    MD5:15CE2E9B35E41615C4719AD65BE15169
                                                                                                                    SHA1:A6FEDA80A0C9A40693D1E26957D2257E3DB3F6BF
                                                                                                                    SHA-256:1F915E15781E025EB11B941D8D7973EFCAA1998624D4840E9D3BA294C184D205
                                                                                                                    SHA-512:293BEE0A38AE975A832167E84A8D0356473BFE39B88B447AA229C04E3BD19B12F5025BA476A0664119EA47FF7966F2558A095E86388D92B53E38F715B26F6522
                                                                                                                    Malicious:false
                                                                                                                    Preview:..Q%............."...{..:....{A.........<...0s......{..................C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\............................................................................................................................................................................................................C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\.............................................................................................................................................................................................................0u.............................................R..........v.vv-.-..#......... ..........Y.......h.S.....5.Q......v.......{..................C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.W.e.b.C.a.c.h.e.\.W.e.b.C.a.c.h.e.V.0.1...d.a.t..........................................................................................................................
                                                                                                                    Process:C:\Windows\System32\dllhost.exe
                                                                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x978717e1, page size 32768, Windows version 10.0
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):15728640
                                                                                                                    Entropy (8bit):0.9442000962193577
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12288:QcCS8rMTkTaTeUZT+T5SFnTKXpmlGVvK:QcrTGv
                                                                                                                    MD5:D64BE24247DDAFF5F98E063A7CF687F4
                                                                                                                    SHA1:4522BEE37BB05790B9997E07927F7F7B0615A4A1
                                                                                                                    SHA-256:8F1DE150F3C22BCCA415726737365562CE84AA6D5C7EDA742473ACC1BA7F8D5C
                                                                                                                    SHA-512:BF2987C6F116C41A0DBB4871F1DB9403943D5C007960DB5335B57CF551DADD48A20063E0B12DB2E8E706278654F08951B0212969D467E8576EA6560EA8A7CEF2
                                                                                                                    Malicious:false
                                                                                                                    Preview:....... .......!........v.......{..............................-9...}...9...}?.h.......-9...}..............0s......{..............................................................................................Y...........eJ......n........................................................................................................... ...........................................................................................................................................................................................................;....{..................................*..n-9...}.....................b-9...}...........................#..............................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    Process:C:\Windows\System32\dllhost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):16384
                                                                                                                    Entropy (8bit):0.12816565682947872
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:df07LunqLO1YGkHgUqSslWON9FsnUP+0/nQfG:tuLuqLO1YKxlvXunqNQu
                                                                                                                    MD5:814F9D2A7BF28837229DC3168F8C34FC
                                                                                                                    SHA1:F1A654645DEA9F3D5D333523326E47ABC1732443
                                                                                                                    SHA-256:AF8D3212131FB9195E4795B5DCDA4476E141C920BA5721BE188E8ECB26751345
                                                                                                                    SHA-512:76C6E06F514B51CA2314AE7CC5FF14B7743D75D3D05A2E0412F336AD02D6A82971B38B53405D9B215F69D13B670BF04C04344B2DFC671D8ED9C80FFBA7C05ABB
                                                                                                                    Malicious:false
                                                                                                                    Preview:............................................{...9...}?.-9...}...........9...}M.-9...}.....?-9...}.....................b-9...}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    Process:C:\Windows\System32\lsass.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):468
                                                                                                                    Entropy (8bit):6.397133308482136
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:fjQ2i/o311PbMa0Fju1Ubrw2v4NA7wazt6zNRCZcoAsBhKwlBJAJfJF/E5dlrEBX:fj1Jujnr/vD8aMJZoAGMwlnsRF/E6Fn
                                                                                                                    MD5:FB0C79C010876315EBB54B0852963B04
                                                                                                                    SHA1:37D28B8F884FE87C3CDF2E04F64F2E03DC39002F
                                                                                                                    SHA-256:CBF9CEC9D4E1304A0FF16AAE7DC0C6754EE3B8514F8C222096299A61690D0390
                                                                                                                    SHA-512:A1953EA0BEA1AFC0C90FD1B4C93CF87E6AC7E46D3F79BA62B70717AE62A45646AF03A9EAAF25C1532C0548E8B3A9D0C8491B6723E4C4BB48A63D3D45ABE89E87
                                                                                                                    Malicious:false
                                                                                                                    Preview:............1.8.6.0.7.d.1.f.-.3.e.8.7.-.4.1.d.7.-.b.0.0.6.-.5.1.b.f.c.1.7.e.9.5.3.8..................................................-E.PJ..-!Z.T8e.@........f...!........$.I.P..b....q.s.+.s.:..\.......}......>..p ...|0K:...W;t.#.7)..I:=L..M....f..}{..o.E..H>..b..'......^......5V.0...M.Y..GA..."........xN...Z.0....@........f....P.G....z....I..?.......<.r.l..t..k...t.P.+..h....TR.}Z.[Fj...W...p.^|.:..t...x.....fM.s....*+."s..r.b.....K... ..M._.....n
                                                                                                                    Process:C:\Windows\System32\lsass.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):24
                                                                                                                    Entropy (8bit):4.501629167387823
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:wJjS7j:wxEj
                                                                                                                    MD5:ABB27CC79CE27666556007C97F241F04
                                                                                                                    SHA1:8991A076F9B920557438B1D401CA6ADF8E44ED13
                                                                                                                    SHA-256:BCA0EF9DDE18505110AA8F373D674D7FE78604DA4CD52769E358530F3C1CB59F
                                                                                                                    SHA-512:842D00B6F5B1F840835AAF1572E04F09A389EBDC24BB619E3CA68DEF74C446E5E57B67CE72DED87FEA6FC59881D516008DA696D1C3DAE2B949287035EEC991E4
                                                                                                                    Malicious:false
                                                                                                                    Preview:.}`..>.A..Q..~.80.m.....
                                                                                                                    Process:C:\Windows\System32\lsass.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):24
                                                                                                                    Entropy (8bit):4.334962500721156
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:yBx/Bt:Ut
                                                                                                                    MD5:5F25EA8637492647FA030E2A5AAA7ED1
                                                                                                                    SHA1:DA1A8C76702E5A346DDDD4A5FC1958A5E567CE8B
                                                                                                                    SHA-256:5BBFBDCD9181279C655C9523F619CD1A576142E65696AD09BE68190F9D6A4141
                                                                                                                    SHA-512:EDD510DA4A4F9DBFA4AAAFAA4913BC36732AD2E46BD8958FB39C619A0F5B5039F1BE54A74F532BA0C390F37E3F3DC36D1A12F4069ACDBF797F3EC572E475B17B
                                                                                                                    Malicious:false
                                                                                                                    Preview:..1..+J.@....e.+......
                                                                                                                    Process:C:\Windows\System32\lsass.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):468
                                                                                                                    Entropy (8bit):6.175434731475477
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:fnL5Glga1wRGjQgZRwEQrM7K4iezaEYEvUW93i6:fLInhQrM73ie2W9
                                                                                                                    MD5:1701E9D6FB68E75F4B5E24D5F8865A55
                                                                                                                    SHA1:A80B7D0E2B3BB3D083228A92325F76188FC33471
                                                                                                                    SHA-256:1D7A294A8BEF01F20C4B4CEFE0E7C4959783B826D927BC7823D89B1049015176
                                                                                                                    SHA-512:BBA7B85A33F71CB6D57DED486CBB21064AB6E1E23C69580393C721EA7A8F0BE6CC124B3D6CA10302A2EB5484C3F77EDF2B68BE0C0EC083039CE13F1CDC29876B
                                                                                                                    Malicious:false
                                                                                                                    Preview:............c.8.3.1.0.f.0.f.-.9.e.c.7.-.4.a.2.b.-.8.c.4.0.-.f.b.a.f.e.e.9.9.1.f.6.5..................................................N....Vd.&....@........f...Iiu.$w....#.........YX}....iO.U.6.../....D#.....C..f\/.`....6..}=...N...f...>....tY3.k.F.H..eP?.OC...*.Q...GN.h.....p.@..>0.....|..l.W...)J>....{.9.Ln.S..G.;...@........f..g.n..8...OfY....s..d.~......)...{.).D...[..p.%..n...h.kd......z..?-a/.BO..*.x5..<O2g..d.... ...3C.WM..K..b....................
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                    Category:modified
                                                                                                                    Size (bytes):4680
                                                                                                                    Entropy (8bit):3.7113653380655913
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pYMguQII4i5lX6h4aGdinipV9ll7UY5HAmzQ+:9A4D/xne7HO+
                                                                                                                    MD5:BA063C62EF76FC77690F80D6D92D0289
                                                                                                                    SHA1:BA63C31A47DCCAF2EC1DC61E08394D6C4C54C9EF
                                                                                                                    SHA-256:1C0E4BBD362E3C18641820FD603297EF0CAA9BDE111BE528F5DC662499646B6B
                                                                                                                    SHA-512:16AB4318B0E3078B9629873ACF098EA9502D1E193DFFF3175CB85C7AC32D0ADEE0D0A001D3DF79FC710DD3FF2ADF80AB2F3C98B826A1090C4B16535D0D4907AD
                                                                                                                    Malicious:false
                                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                                                                                                                    Process:C:\Windows\System32\lsass.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):11136
                                                                                                                    Entropy (8bit):7.978022444004817
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:tszsSW/556/yFaU3lkOKTNOme7uiPBk2jP4SkBoCUjU/mAh+Uk8Gy8DR9b:tNEZU1kOKTIdVJn6oCUkmAh+UkhzDzb
                                                                                                                    MD5:9E0365D56A2CD857D810BA60DCF61976
                                                                                                                    SHA1:098B4956F87612D7F5EBCAA2B9925023BA3A0F68
                                                                                                                    SHA-256:30820468AD9E18920A9F485C16CE586E205A3131E837FF04CABDE5270CA7F8D4
                                                                                                                    SHA-512:255828C8371F99C3A8ACCC91B3614850D2B715D18E696434069681736498A4769E5662831F2FEE5538120505D03ED1F344D6C4270BB6545DBE83A4E978DE79A8
                                                                                                                    Malicious:false
                                                                                                                    Preview:....t+..................z..O........1..+J.@....e... 0...L.o.c.a.l. .C.r.e.d.e.n.t.i.a.l. .D.a.t.a........f...... .......&...~..-zU..;...n.........]............ ......NV.N9...>K(..>.?.o...8].-1].p*..U...1....F..........X....}<%;z..[v...pe;/...G..-.r.5..Ry.w..+.c...H.-..Q..!..kX@...-h9.......>..^/...C..g.,sOZj...cs-.......&LF....D....;n.s#...~.*.^..|.r.{jjv....8e......5....+\.\.%w.x.....P.7...-...:.....Q.T..~j..j..[....f.j.H`.`..\.*....i....&..]%(.........@......(f`..y..d...B.G....:B..c.20.....P.-J,....+.y..........".....L.K...1p|[^.V.....w.X..b........W..W..(.!2...8u_J.jn.......P...8.X2..d...#.2..'.+.${.....'.8...4.W..ix..8..."..Y...Q)...jR5_.\hX[F..`........s..>..W4M(.&_\.W...1..1-....4....F..O'..]...V....d-.....0n.Y...*......h..]d...i;.G.sf?..m..O.JD...-...c./._.FX.p..90....H`9...d+%.?.h.|m...\.v,n7..|..d........q..nP9j.8....0.C.R\.!..]..9j.)?..........x......G..EF.6....{.....z.~L.'...?.ga..N.l.uf...$.Dq.6.l.3..uU}..y.DP..].....v.7v.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:modified
                                                                                                                    Size (bytes):8176
                                                                                                                    Entropy (8bit):3.9135114845749834
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:JjYXjPJRVGZzpbZKpbuShfpGzpbPatmkt5R:JjYTPJCzVZKVuShfOVPvk
                                                                                                                    MD5:1F946CF0DDC0F02A09FCF99F4CAA0219
                                                                                                                    SHA1:1F550AAD208F1039A30F40427DD1402928EED635
                                                                                                                    SHA-256:03106C9C7CE45A299B6DA7C18A55F15FDE0930B3D9F3F38A39439E3C73D473FC
                                                                                                                    SHA-512:6D784A51F59884880821B3DEA8F8C0CD4CA7F66E1B25D02119D30E7EC91EF9F6E110DD4F0685B7EA71C4FDA5BB1E2F0AE80664527263BFC810759E15416A6D30
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.................[.......`...........h..............................................................................V.ck................y...........................=...................................................................................r...................................t...?...........................................F...................M...5...........................R...........................&.......v...................................v...............................................**..P...[..........'fg.........=F.&........=F.m.^.V..7...y.......A..m...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..2............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.A.P.I.2.F........)...G.u.i.d.....&.{.5.b.b.c.a.4.a.8.-.b.2.0.9.-.4.8.d.c.-.a.8.c.7.-.b.2.3.d.3.e.5.2.1.6.f.b.}.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 310, DIRTY
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):112664
                                                                                                                    Entropy (8bit):3.7407323185353833
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:CVUHiapX7xadptrDT9W84H63VUHiapX7xadptrDT9W84H6:9Hi6xadptrX9WPaWHi6xadptrX9WPa
                                                                                                                    MD5:98A140380B258B0A04E638D1B6CFE0B0
                                                                                                                    SHA1:C0A7ADD444AA576EE21B7C1AED37BEEA52A1FC59
                                                                                                                    SHA-256:03F3C14030F5A53C49FDCAD5B9EE5401B39F96BCC968373C7F6D39C803B82EA0
                                                                                                                    SHA-512:AF355A512504BDF1B4919E1FA28A27CA74A658DC07B45EDBF03EF0C11E1FF4F73654E8AC5A657DED60BB68F7B878242FCE98F56681877D389D2AB5140388D65B
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfFile.................6....................................................................................................I].ElfChnk.........7...............7..............................................................................................%................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.377721629524822
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:fhZN/GN6N/NDsNadNDtNkN6NQNQxNhdNQaNwNwNONPNavNqN6NfNjNALNCNyN7Ns:fZeIPRThtUmqYXL3QXr0Q7
                                                                                                                    MD5:B59AFB7FCA4C7067FBB3EF413064809B
                                                                                                                    SHA1:785A500AA8ADA1D59F3F7FD48E876F2305E7072D
                                                                                                                    SHA-256:ED35583D239B8BBF565E20C872268401F9D05A4DCCE4ABA7F83BA99A5978FD95
                                                                                                                    SHA-512:C86B8AE075AA4E669D9DE8EDC1C3E430D68F1A155153EE7B4C7B1898E03E42334C37FFAE7CD35B759EB019822762C7048083BEA711439FAA1D869360CE59CD88
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.{...............{..........................[.x......................................................................D.\........................................V...=...........................................................................................................................f...............?...........................m...................M...F...................=c......................=j...........................?......]...............................................-g..................**......{.......n=.df..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):70656
                                                                                                                    Entropy (8bit):4.271873510615837
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:8izVJVQVLVbVOV5VrVQ9VMV1hMVnRVSV3V9VbVSV5VjVMV/V1VQVPTV0V6V6VoV6:8iSs+HbiSqi20Hl6Mun
                                                                                                                    MD5:44D5AE36A070F68A241685B4E96EAA5D
                                                                                                                    SHA1:8093755D27230DC115B3B2A1FECB05D923BF68C2
                                                                                                                    SHA-256:938DF9D2E6D83C883A74ECF021CD6D53F529663F619178A93A733D331E2691C3
                                                                                                                    SHA-512:D4875C105231092A02466218C8E0D1A33A3776FC541E773DD4D6FF5007F4718ABA0FCCB84D64079490E6AE4F8624440A96213A09289EF1BCC2848E94A80890AD
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.....................................8_...a..7T......................................................................z..................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................9@...............................=......**..............!.r.g..........Z..&...............................................................@.......X..._.!.....E..........@!.r.g...0.U.f...=,U.f................................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........L...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s.A.l.a.r.m.s._.8.w.e.k.y.b.3.d.8.b.b.w.e.....n.d.o....**................s.g..........Z
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):67008
                                                                                                                    Entropy (8bit):4.181475051527736
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:XmnmChsmsmi7mRXZmVkWmhTimmdmBmKmPhmRTmimZ8mevmcsm7mrmQmzmjmvmTm4:q2klTiGFKX93WGUGbeOg26
                                                                                                                    MD5:AEF52638B1DC27DC32933C3A8FE08356
                                                                                                                    SHA1:BDBA9289333E6A9A4DB2469DDE932967EE30B2EC
                                                                                                                    SHA-256:F1D7615319E659607A5A89B559A2BBC2F8D4D114BBB6799AA014B9A151FADD88
                                                                                                                    SHA-512:C66E78658840DF1D4305609691A7660D78D140FE53E8B5DEBA9388522BB81172CBE2C01CDEA9DE0F4396729E0C4E61975364D31C516CB151B95BF6F60E7FCC86
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.@-......o-......@-......o-..........(.......J.........................................................................................\...........................=...........................................................................................................................f...............?...........................m...................M...F................................i...&...,...........................7..................................5...c#..{1..k:...................v..........**......n-......ai..g..........Z..&...............................................................N.......d..._.!.....[..........@ai..g...0.U.f....!U.f...$.......n-...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.-.S.e.r.v.e.r.9.G?...J...]..-CM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.S.e.r.v.e.r./.O.p.e.r.a.t.i.o.n.a.l...e$W..R......................(.....................s.v.c.h.o.s.t...e.x.e.,.S.t.o.r.S.v.c........-.....**......
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 4, DIRTY
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):70680
                                                                                                                    Entropy (8bit):0.7871625590975453
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:P8V7pp8nMLkmp8nPp8nkMvop8nwV7pp8nMLkmp8nPp8nkMvop8n:P8hpiMLxiPikMwiwhpiMLxiPikMwi
                                                                                                                    MD5:3BA8E0733B35DFA9A0067A622B9C0677
                                                                                                                    SHA1:7700E60AEA9634D386F583C32E99E2F3139AB0C3
                                                                                                                    SHA-256:E85BB8D391E033F7669FDA1500BBDF3493865E653FFBE26166FEAEDBC6FCE685
                                                                                                                    SHA-512:94BC6E370BA90AA6CD1DAB79A906E1F337B158F7D3324096EC1E6D0A9FAE2F4A686BF485A76B48A1920276246C5485C2BC01EBCB1F696BF504D51D3CF192BDAD
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfFile.........................................................................................................................ElfChnk.....................................@........[B.....................................................................=...............................................=...........................................................................................................................f...............?...................................p...........M...F...............................................f...................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.467947111655398
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:xZPZn2bBN2A4VD7VAx8whAGU2woJQghwMvOUFwe8OQhNwRA:
                                                                                                                    MD5:6B473E7917B1EDEE80CAFE7D24A6A4E8
                                                                                                                    SHA1:1940F41550F2986C928648ED00F9C6E4868D1A23
                                                                                                                    SHA-256:1D52F13D2EA4ACC472815240DBFF0F34C6CD5E86F980D04D9AD28E42C3E7A355
                                                                                                                    SHA-512:9AABAD5B7425A9692545864C11B99DDED0051CE8B442FFAB7BAB21DD8CD68B51BC980B01F324A81C685DC56793581AE2E6751DD08497CCBA64FB3339A9B5483D
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.e.......h.......e.......h...............x....;.......................................................................Z}............................................=...............y...........................................................................................................L...............?...............................................M...F...............................................&...................................................................................n...............**......e..........f..........'.z&........'.z..^................A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.565838744973026
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:PXY5nVYIyyqED5BVZUe39vHxt1BSocM1:PXY5nVYIyyqED5BVZUe39vHxt1BSot
                                                                                                                    MD5:B30C931B9EF047307E1443502CE7EE14
                                                                                                                    SHA1:BAC3632B709B853DFFCD9C4D65D1F9236F6FE551
                                                                                                                    SHA-256:033CF49641F4E76EFABF8F25753074E7EE72DD567FBA4145D446032D3D9CFADB
                                                                                                                    SHA-512:F5A9CA2D464EBA1F2F4EA426AC3864FB399A8951958BA44BA550E2129C4F4D4DA9E60F0D1B18A07CC76D4BC2CFD20D283F446A47DF990B52916113D5383A1952
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........~...............~...................F..........................................................................T................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................N...............y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):93880
                                                                                                                    Entropy (8bit):2.1481786625447885
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:BosKooAhdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorXorWorxFo8ory:HDCFUDCF35
                                                                                                                    MD5:5EEBBC1CE5CA3E469B5FCA1097EB12DE
                                                                                                                    SHA1:CC540EAEEF97F6854C95F3DC35B7F479EAB327A5
                                                                                                                    SHA-256:A9D20784F3B6618E740F559CEE42F74F6B87C6C392A0E0484838E50511818BD8
                                                                                                                    SHA-512:EF8F441CFB68245784F2532D4A679AC4B82F24485501A3372096A2A21416BE1F23481C2A11D2BB7FF15D6F7E6396CE8A97B37693098A0806811692F289619A99
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk......................................+...-..T..f.....................................................................b.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................ ......U)..............................**..................fg.........Z... ..............................................................>.......V...X.!..e..................fg..0.U.f....1U.f................................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>.U)......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):0.8511209646626153
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:ChAiPA5PNPxPEPHPhPEPmPSPRP3PoPbPfP0bPnPdP:C2NZ
                                                                                                                    MD5:A98C811B8E1B821CD1FE05A68ADD446A
                                                                                                                    SHA1:4E8B739F5E308F943962E72FF24212FFBE47FAD7
                                                                                                                    SHA-256:58F6584C100174B80ACB8940226841B77884326A293CEE9072F4DD4CF8C10133
                                                                                                                    SHA-512:24A7B9C86A6CE93B9B7F4107A433A247789EE568EB69E301B51DC9D01AA40D2F408AD76B78F7F83E5F4EB47C1677276BC86F86A99BAB95186C2331ABE4CA523C
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk......................................%...&..?........................................................................<.m................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................ ..............'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):0.8431535491551847
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:OhZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+lk:OWXSYieD+tvgzmMvRQAsNi
                                                                                                                    MD5:106F006ACA6287586EF71A10A5C06C4D
                                                                                                                    SHA1:B4B6D91FF53E9BDFC8D0D99A0D6F643E49074932
                                                                                                                    SHA-256:79E64A943AED80ADAE43934E4573F95AE7308DDD6FC896EEDDB386C8A41FBA65
                                                                                                                    SHA-512:F4D49C8CBC2B46719521935DFABDC3E05883C2360D4E472920C420B1ACC74D0F835D10A2C5BA6E29038425809D585025172FDC9E534619C017D70FA4D9F23D53
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk......................................$...&..{n.8.....................................................................{..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):105296
                                                                                                                    Entropy (8bit):3.76851468404245
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:gehXhqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRq0:g4bCyhLfIIDAbCyhLfIIDU
                                                                                                                    MD5:1AEE33D531D37204F8A7DD5BEA90CED5
                                                                                                                    SHA1:1E0AD9F912BFC41440E1E58A5FABF0F5AFEA2E5D
                                                                                                                    SHA-256:7C623311A59409CF7F051AF6E173C49BD046FCF983B0D5504657F33877106077
                                                                                                                    SHA-512:49B7759F7E4E232AF175A07A0865B849C53B59786D8D3D7B6A4C330C6FF8812C347CFE4CCDC43570C8D41213930EBA70DFCFDFFB13C000102F78302305C38067
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........K...............K...........H...0.............................................................................{................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n................................................{......................................**......K...........fg.........Z...{..............................................................<.......T.....!.....................fg..0.U.f.....U.f...........K....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I.@.....NF.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I./.O.p.e.r.a.t.i.o.n.a.l....0.............`...2......K.<.....iC.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.M.i.c.r.o.s.o.f.t.\.P.r.o.t.e.c.t.\.S.-.1.-.5.-.1.8.\..............
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):113176
                                                                                                                    Entropy (8bit):3.7422518246823886
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:5cMhFBuyKskZljdoKXjtT/r18rQXn8BiJCF9HhrpcMhFBuyKskZljdoKXjtT/r18:CMhFBuV3MhFBuVa
                                                                                                                    MD5:3DC282FA556AF933F0DBFD782C1994A9
                                                                                                                    SHA1:D9C88E555D2AC0EF287560C0B47AFB520FC6C66D
                                                                                                                    SHA-256:010A2C2B6C5F6BDCC87965C145DC0108EFD580A67F91ED568AAF774318D244B9
                                                                                                                    SHA-512:7DF58DAC6189313CB93C54EBE939702499889F9B1F2C062D33F7B712CDBB2A4AB2C9BED51D4F4B1E47B0B6BDE9425F908136972B888C3D6FC032E6B9553A901E
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........M...............M..............8...^..Q....................................................................q...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A.........................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.895073955959755
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:9WgjQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZavAFDtCwvhr9MUr:qHuO
                                                                                                                    MD5:ED84590A35B44C6B30D6E2F9203091E7
                                                                                                                    SHA1:6D95D91609E58821C91FC8DAA4A7A69FB7F69C37
                                                                                                                    SHA-256:72F1C519496A266DBCE6CB635DEFC46C652E81CBEAB88FA1335707AABF4B00A4
                                                                                                                    SHA-512:3E81F73413A16CB6A5298E57F96E760E1EC717BEC11E768E3C9423827353F81162972CFC60B73BECF29D11BA63D46BA38C4AA5032C667862E35EEB101FB0BDD2
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.v.......x.......v.......x...........P...`... .'......................................................................K\u........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..@...v.......7[..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 25, DIRTY
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):92008
                                                                                                                    Entropy (8bit):2.6818774465927118
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:gah1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzM:3MAP1Qa5AgfQQzygMAP1Qa5AgfQQzy
                                                                                                                    MD5:E2E1F63F2CD675CC5BC04EFE2C675D67
                                                                                                                    SHA1:77D9517D49EF0D5402B1E4B54547D8DC1F20AB5A
                                                                                                                    SHA-256:2AA6AFC6514FE4BF542D33909CAEB14EE2C34E3CEC9F106F6336BEBD1666D520
                                                                                                                    SHA-512:49AA46105A855CD8394945130A95A4255A0EAE3C4A48AA971EA958CDE927C0F17438420661DDA109E2194CA5988D73B7C60062D16C69DD93F26BD18DBCF9BBC4
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfFile........................................................................................................................WElfChnk......................................c...f..VD+.....................................................................njS.................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&.......\......;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.441017411582523
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:BhdERE5EUELEvE/EpEbEmEfEjoPjE4FEqEZEVEiEUhqEd/2EME0EHE+EIy4qEQi0:BQoPjvh7jhHl7lzuzbCN7y+D
                                                                                                                    MD5:8D30244BF7119CFA2F8A7A5AF8FCDAB7
                                                                                                                    SHA1:F0827675265E0DF98A4967D8A539D476551DCAA6
                                                                                                                    SHA-256:489E810931FD45E6D7620FE65EBF1F1A66235B06E572C2C293BD080EE1C8E1ED
                                                                                                                    SHA-512:C71504A8F8D370825FC0C8C605B9F7217EFF2025838ED8FDF3F04CCC41E86751659BB60C7E79C48BBDDC1089C771DD16A193C107DDE4A1487F037BB2FC1455B8
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.q...............q....................i..Pk..buI......................................................................o._................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F........................................7...(..................};...........?..M=.......9..............U*..&....$..........."..............=1......**......q........|.xf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):3.2803522685445374
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:RhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3Kl0:R1T4hZovIZC7
                                                                                                                    MD5:4A70DB2946C129829BEDDB2E147FBE04
                                                                                                                    SHA1:4D3255FABE0E857840591072D9370047FDDFB83A
                                                                                                                    SHA-256:C10981A84E3884E62907E34159FB7AA2D1F908C3E328D8D8B942B9934DFDE09C
                                                                                                                    SHA-512:7FDBE43D4773CBC17A3879CBC012F8C9FC823529DDF6FE5E10C623B2D7AA89159132F10FE01C0632B6F8F92A0C474C67EF1D5DA4DC2EDC3CA5499D6220922AA4
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........k...............k...........................................................................................<../................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):2.445920452673848
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:ihFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDff:izSKEqsMuy6SbKrTPpOIKm
                                                                                                                    MD5:21B26F726BBEBA7FD5C4C45386FC544F
                                                                                                                    SHA1:F6CC3E80D2AD9D2F420C42D7DA3AA3C48C9D956A
                                                                                                                    SHA-256:63E1A62EA280BF1B031E1C98FBF21FF88795119983E5BC96C036B8EEF30D325D
                                                                                                                    SHA-512:A28CB789E4967DB231359AFE7D221C55A57FB56EF899997EBAA0F79EBD92D34547530A64B4B5492400ABFC81631E5ED792D47B836525E5E1583BA6F656062DD5
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........L...............L......................f....................................................................s.J.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=........................................f......................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):2.1562721664799103
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:BhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3z2:Bmw9g3LQ
                                                                                                                    MD5:B2C3D7448B237C268D23FE1A78777AA5
                                                                                                                    SHA1:6C3A39325392F2B088C00CDC1763268F15832447
                                                                                                                    SHA-256:05BC150DCBE6B62CE7D2A9CB8F706130DF70BABC54752199B02B4C91ACEE1C4E
                                                                                                                    SHA-512:F9286BC0FC6DB6C52295C0292E2BF732C010F2D542999085F999501AC555C317FB1AFED9A2FF2DF6D91913373D0A32D2307C707381419883F5605F1D67DEE70E
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........6...............6...........(o...p....Zo....................................................................ZU.#................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#.......................................^^......................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):1.9195298486885948
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:3hPIRbiY8SIUIi0IsIGIAICI5I2IBIaIKI+I3lKaZrIVlKaZOITTIwI:3LQ9KC8KCV
                                                                                                                    MD5:D4A00CC59E964B7DFD6EFDB643322E9E
                                                                                                                    SHA1:7307AF862B22D743BF6B531829DABE041E9F1F92
                                                                                                                    SHA-256:49414D51861772E0899416FE42628F8641622E9F793F435DE7F0118F45EDE065
                                                                                                                    SHA-512:51663BF2E9D8F1FA3BA6B87918CD36A02AFC2F53FF89F3ED104A4B4129682F0947DC825912A81844E2D25083E7249CE7C1EE8F899D847F511AB20B0404B22F27
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.K.......L.......K.......L...........x...86..........................................................................E.U.................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..x...K.......1..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:MS Windows Vista Event Log, 14 chunks (no. 13 in use), next record no. 418, DIRTY
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):40400
                                                                                                                    Entropy (8bit):5.676536752030033
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:fphKa5SzuzNz0zxzuewKWMKFza5rta5ya5e69a5nla5f2KnzyzIzka50b+a5Ba5U:hfSik7eQwmJlY7bc
                                                                                                                    MD5:22B4475F2119BE9BD782B7FBC93DA1C2
                                                                                                                    SHA1:902F0278430E8494FBCFE16736D777D9A1DD6FEC
                                                                                                                    SHA-256:0969AE994404D3D7067FC501B0BEBB17773A81DC27F57D6927CFE7A21D9F6046
                                                                                                                    SHA-512:B1DA3B8B75C5C1DF13B16F2CE450FF69A489E99997D06C9E533F3B3DC3C0573FFF5810CBE21EA6292CFB7FA0AE9A2D5C430B65D1107AF331F250BB1A17EAA8C7
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfFile......................................................................................................................?I.ElfChnk.....................................h...P....G!........................................................................{........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................V...........................1...{!......**...............O..e.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):1.119748237037944
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:Sh1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMpRaMRlM7kMGU:SeJB
                                                                                                                    MD5:D1CFC256BC075DC75D7FD92207C9C0F2
                                                                                                                    SHA1:587C19CF65305AD470E82AB5A1ED5B2E36472625
                                                                                                                    SHA-256:6C0365C674BCE55E0C49A62D23782660D34ECB388A8A7418AD9A75DFD36E612E
                                                                                                                    SHA-512:85F88C26274975D8EB8DDC65297064427A103B557712BD46F459B8E26A1B7E38DA3B4674920FA61476D108BA3B9846430F59AA82926AFEBDCE92B25A527331A3
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk......................................1..p3..\q........................................................................_U........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................,......................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.182756017330751
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:9hk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS1B:9BjdjP0csdHkp
                                                                                                                    MD5:9BA8F6B60705B6A27084436D1D4370AD
                                                                                                                    SHA1:DCAFEC9C3F76CCE3FF65F8FED6E373B863780B6E
                                                                                                                    SHA-256:580E71D95D6201104E37944E8A0A6596869D6C8A0CA2CD3B704FEFC9D319C957
                                                                                                                    SHA-512:BFBAEA71174AEE5233857BFDB4427C59D945A3797EA6F5D02708807321E0ADD12ED632BAA3C5E59141CFEF108FADE90315AB670BB960A281D0E95DB18C4976A4
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.....................................8.......I#.e......................................................................hB................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):77088
                                                                                                                    Entropy (8bit):3.2911107669337167
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:GeIjTCIWIoI8IVImIKIYGIxbI/OsITpIdI0ILI8IPIR1I7IrIl3hDIEQAGxIHIFc:GDe3ZxGe6dh
                                                                                                                    MD5:E7B526DB58EEBF8318C7A03920EEA7A6
                                                                                                                    SHA1:6788BA39170EE5BA5FBEC88C60C8988651FBF6F2
                                                                                                                    SHA-256:AA7A800724E53D1B0EC3F76F2CD7A81F2122398FB89CFAC611F2CFAB7BDEC205
                                                                                                                    SHA-512:002C83B06431882580D01A143EB953102BA00BA6CCC367D022CB646F1F8B7869A5A15D202E7C262BA5B94AB4B1ABE448D734EC5AEE448BF9C056A93601FD0575
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.T...............T............................>.................................................................................................................>...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................1............................V...........6..........................**......x...........fg.........Z...V..............................................................,.......D.....!........... ....@....fg..0.U.f.....U.f...........x....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l...........&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):0.800476718060657
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:7h6iIvcImIvITIQIoIoI3IEIMIoIBIzI9IwWInIE1IFtI:7oxqV
                                                                                                                    MD5:F25E3A5940E51F9A49AC271DE377E2C1
                                                                                                                    SHA1:38EB4D0BCB8EA4C72C03AD88CF9B7136C39BCDC5
                                                                                                                    SHA-256:D2B29761907A72BE3EC03C586D87729FF91EE3D9A6CF39319FD90A1977602663
                                                                                                                    SHA-512:CADA8EFD9868D26AA1B4DBC5A5BDD31E624547E5755ED7B413EA74D69AB731B000BB2B8FCBDD3027FDA278A7D69058DF4BE3BAEE5AB253055C70EDE7D3AA9993
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.....................................X"...#.../......................................................................V)..............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):2.999140584854273
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:q4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH135:o
                                                                                                                    MD5:5234109523F4243D8DFEEAFD9202BC60
                                                                                                                    SHA1:49A4B237FB8BEE3A2BDAA0C20A579E06D2645F65
                                                                                                                    SHA-256:D4CE68FD0E970CC24971E8258B962534A3BF7CB1F1E6209AA0BB1D09F4FB80E6
                                                                                                                    SHA-512:C2CC9A4E7282BF37C4113FADBA4F7FDD1D2094B8F40FE145C58A5ABEE4A90BCD55FBD8876415BD9140EBEE36314D02FEE5525076B539BB5AA01FB1D32058B426
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.....................................(...8...|.........................................................................6................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.419925107849231
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:UhWKyzK5SK+jKLSKDlKMAwpTKZDGKPK9KyKJSK2KVKzKAGP1K6GSKzKhMK7KS3KB:UIgpCnz/Gh4wRub4r4p6YFv
                                                                                                                    MD5:57A513DE874B48BD17EBCDE7C461928E
                                                                                                                    SHA1:6F8FEE2AE4680B3ECB4B1FEDE787D2D5B840B42D
                                                                                                                    SHA-256:F22FCDEB152790BEC05CA669AF249103061B5760D232C6DCCB6845DF596D0D96
                                                                                                                    SHA-512:676C234B72F5A43FE02A3E220C591A03CF870E86AA9FA062CD4D8C6D1FCE81A096A89EB9F8F305E9C1A8CC075C8FCC2EF924B5330568B5ECAF8D48957D2AAC9D
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........[...............[...............H...xQ.........................................................................................p...........................=...........................................................................................................................f...............?...........................m...................M...F.......................................................'f.......D...T.......................s..........O....p...h............../$...............}..**................qdf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):0.760021633915647
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:4hP8o8Z85848V8M8g8D8R8E8C888FB8J8a8:4R
                                                                                                                    MD5:91415CB1A68CB19DCDB017402AAEB51E
                                                                                                                    SHA1:EEEB808B9D0DFB3DB247AA10B64290A5029EAB89
                                                                                                                    SHA-256:EDEE7AB462BF2D986393D24304BDEF02415A6E0483DE793BD452E169B7D08170
                                                                                                                    SHA-512:C2F5AF43559DCE7BB66ABE305DF2DCFF0C95E2CF431D8DD0B6A02E216C8F4329C3B888BF2BF378918851A3066976FCEE745593B60970E5B9843535E6301E5BA0
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........................................8!..$.0v....................................................................>...........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):3.764192001733737
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:1XhhUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:1XXnS
                                                                                                                    MD5:0ED96BE20298C8DEF888FF2A082442D4
                                                                                                                    SHA1:E2D9A51C33EDF8F2F6E2DA34F1C0B70FECA15230
                                                                                                                    SHA-256:53C1590B02F63FCC3A52FC0B236BEA6521DA853A90DD50C3CAD4E0CE5DD58566
                                                                                                                    SHA-512:DCC7C59B5EFBD6C4D23A40067618EA0DB08BE5F60C1615B79BE1F733E993DCDA60C2E552BA033E16FFF157F702E9C1C0BA92FE006EA676A0443949B274851BF1
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........'...............'............I...J..j.........................................................................&.................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................>..............O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):97584
                                                                                                                    Entropy (8bit):3.1193008477742024
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:50VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9OaafcmafEMXW0OWkjWr:jcEtbcEtQ
                                                                                                                    MD5:76F7DE1F3382A11064C37C88A160BE55
                                                                                                                    SHA1:A607DF794AE353E96AA98C81C8147EA64E135312
                                                                                                                    SHA-256:26BA16DBF0ED3D6369104DD66075A82840C89352760D73976626C08ABA248119
                                                                                                                    SHA-512:D93DDD602E78A77CC94B3D80B03C31DC029CF792858249CB6F86A4BCC8511F8378EB55EC90786A35F9D45B0796E97AF46B736EABA719A72E3C82FE405EF29A4D
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........?...............?............y...{...v.......................................................................bV................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&.......>h..................................................%_..........................]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):66816
                                                                                                                    Entropy (8bit):4.1054274421917745
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:3iHG25hNiGQ5XpvVRYBQf5pJiT5pwiT5yY4iT5pBiT5p7iHG26bik5pKik5yY5Lx:8XLpBVi7CPqmxV
                                                                                                                    MD5:D97EB8FB14D1D1D41BF3F2B2F86E721D
                                                                                                                    SHA1:3365D1DD4B074355A98DE7F25BA770ED715A08A2
                                                                                                                    SHA-256:A0F24EF6BA119787DDAF4F242BD4AB1E834353C6A7B23AFA7B031EA3BABB4B3A
                                                                                                                    SHA-512:42A3924D317290D91910E27E71CA3E6CE094014ABCAF2B441C786E03898947C2E2AA61884A3826904434D795F1AB82EC300151CE41459BE8B3EEFC17B2087422
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.'.......,.......'.......,...........`+..`....eRP....................................................................".??................X...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................1...............................................................&.......................................**......,..........%fg.........Z..&...............................................................L.......b...p.!....................%fg..0.U.f....5U.f.......t...,........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s........J...M..<.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s./.K.e.r.n.e.l.M.o.d.e...!..^1...........h...........................................4.\.D.e.v.i.c.e.\.H.a.r.d.d.i.s.k.V.o
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.322146858454247
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:NH6/hDGCyCkCzCRCFC5CdCbCHCQCrlC+C2CV2CfCrUCECZ/C/C/2a22j2EW2z2/5:NH6/d7kNrTgt
                                                                                                                    MD5:D8DABE7AC7FE8F2D1CD853002971BB8A
                                                                                                                    SHA1:AC6B0F9940C1B3DB1FBC58DE8A95DD252FA73A6A
                                                                                                                    SHA-256:DDC0E74C04DFDB71841128067C33E0B5388CC5E93EEA1FDA4ADDFC6CA39FCC77
                                                                                                                    SHA-512:A9AF55922FC793B10A17731BC7F83A70E741E695B47249993530612A11D0A41481068A4DFD4B07182F5604A4AE289211D00766B79DB67CC25171D4ECA5A9292A
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.U...............U...................`...h....fyC......................................................................K................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F............................F..............................&...............................................nw..............iq......................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.475265357832672
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGDL+2ubu1ho7t8ckcXWIkFElThsk687vzGe:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGD+
                                                                                                                    MD5:605D94FA0C65C59EECEECC2BEB2F61B5
                                                                                                                    SHA1:28CA14F5E02A0A0348C4AC4A22BC228390B64F94
                                                                                                                    SHA-256:4667182188A73611A09A2F2B7A5E623367634933BE49899E07ED2FFB99142381
                                                                                                                    SHA-512:10CC31A6B3F5CC0AF090861E7EC615289DE4AB43E7B612F4F6518D6FEF8CD943E6A0F8A165AB4F6CAD5509575CC0C0D46960940799C95F1C6D6F103B4594EEA6
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.....................................0k...l..C.......................................................................2\x5................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................6Y......................................**..............X.j[d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):70808
                                                                                                                    Entropy (8bit):4.463685706432065
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:qpfNJyh8H86PbkyzFyQWsk4cLSKph9YC/cmqbL9tKGjDLSGUpBpJyGBApfNJyh87:qpNJK8H86PbkyzFyNsk4cLSKph9YC/cf
                                                                                                                    MD5:B32E7E1E829503603F6C47F0DCB7072A
                                                                                                                    SHA1:0F06B332DCBFB822AA71E3293311BA11EAE1C89B
                                                                                                                    SHA-256:56E1F6FC90CEB3699414BC1930CF7B3DE11D221435847FD2866E13C2632B65F2
                                                                                                                    SHA-512:11E7E3DD141A13F1BFCD457673DBB70B0FA069FA5BF956DF14CD323331190E0C92235D6715B38D56F883E6D5CD12A1EB1C76CA25745CA03BE3FD4FC2CB3CC587
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.+.......[.......+.......[...........X]...^..e=7K........................................................................................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F................................................................................................O.......8..&.......AR...6..12...............:......**..x...R...........fg.........Z..&...............................................................8.......P.....!....nqm......... ....fg..0.U.f..../U.f...........R........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e..n30'.|D..Q.R.a.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......L12........r.i.tx...**..(...S.......%V..fg.........Z..&...............................................................8.......P.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.517082344367377
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:YjdAhA71d7587RS7a07DL7T7G7z7L7k7OXD7u7y7I717/7u7m727L07E7K72t7Rt:YBAiHEV6koTxbkeQEWi7Di
                                                                                                                    MD5:2628D3458E9FBE638FC3A49E317866FA
                                                                                                                    SHA1:8DB033ED373F8A837073679CE0F3B5DC1BD7085B
                                                                                                                    SHA-256:D2B987B5AC61D1C66CACD6D0492AC4C4C316C9EE94638A0D312803BB9C24FD00
                                                                                                                    SHA-512:6C3683E0A8CF261353830E1F2344A59428E55BBCAFE032AF52624FF961F28608C7E64134BBA4764DEB8885D384DFA593325DB889E9D752226FC29885E3520A67
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.....................................po..@q....`....................................................................\.$.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................e4.............../..s...........&................................................L..............e2......................**..H............<R.d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):2.314954486903959
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:5mhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauia:s6Ovc0S5UyEeDgLpIC4DoA4
                                                                                                                    MD5:864CAA67E4BF2A335E088526FF347CD9
                                                                                                                    SHA1:64E224001D864A18D4999F5D33A42C532877A361
                                                                                                                    SHA-256:C904C319101B31E991343FC8FF2929F6841599C9DCC23AC6218272F630AD5894
                                                                                                                    SHA-512:B899FA6CDC7D0F97BACCC9025516045878BBA58E86ADEA79AA164B3B27F00F6E52F8B8838210A3ECD0C0E6A20D9DD48A4A4754F7408C1DA5F1FDC2EE7A504231
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........A...............A............u...v..........................................................................c.w.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................6f......w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):2.773262505715791
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:bhGuZumutu4uEu5uOuDuyb2uPu1uVupUupu+R7udu4uEu1u0u8uhuluxuMuxuMuH:b/vI
                                                                                                                    MD5:C06B3BF303EBDD17D76D87B596EE5407
                                                                                                                    SHA1:BFC46338E3A89112D6D7E1CFF7A9FB5909DE6458
                                                                                                                    SHA-256:26AB9FE5730119306B700304DF2B2C11C6E8322F29CAA9AD49CBBA968DD54CD9
                                                                                                                    SHA-512:7CBD5FFB770669AC0295C6221E02D24C116F4B72E3D990F60D122B2AED3280075DA5C3DBCA8A5749F5E566920799087D1094ECB31B5937D8B78EFB40BEC0D0A2
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........T...............T...........@........J......................................................................?..................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................vN......................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.2371167268838485
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:RhiAeCv4A+yMrAmA1AHA6AbAMAEAFmANA49ALAEAyKiAfAFgAw+AqAFAApjANAil:RCCvudb6KinaWRQJ4+8nEPDh0
                                                                                                                    MD5:3F2115642206C3D448781C58F4EE8AF3
                                                                                                                    SHA1:1408F4FF05D6887F74B445E296BC9B69163EDDAE
                                                                                                                    SHA-256:84EF0FE4C7A64FA8200DEE7E064A658C2BB94A262A6DBD1353CB7EE458DF1684
                                                                                                                    SHA-512:C3B530EA9AC3FD03615D91457CB88474254CCC6B53B3737C932690059274ED18552F40836F7CF78B698A650D636A93B72EC8C8E8057921A28CAF3718D18C85CC
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........................................@....a..........................................................................................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................5.................................................... ..........&................................$......**..`..............;f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):3.1631981097466806
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:4hKpsdp90mp9b2p9iGp95ep94+p9/Kp9Wqp9tap98Cp9Pp96p9lp9za1p9Dp9Wpb:4cafg0Y
                                                                                                                    MD5:CBAE5379AAAD2B6A84714F5CEA39ACFA
                                                                                                                    SHA1:A1AC7C71917C9F27EDA9E17CF0CAD78FC07A82E5
                                                                                                                    SHA-256:726B1343CDE4D4B7D2558B9B3E86DAD3782983304D0349974FFA7725D40A9D2B
                                                                                                                    SHA-512:7A6DF8A6BDF99348719F7005EFD293089BDD9EB93E2801CB7F3F38C77717E1E47D496E7A1D8FA9FED8EC27D28946214B71C7B156A537B40112D4A76E38F968B8
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........'...............'....................k......................................................................+N.>........................................<...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............E.yrf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.036288214996343
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:vhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWB0:vwDoh1V00eB9iVsTBwMjO2
                                                                                                                    MD5:80B64057A5C06D0016A06F2D493CF301
                                                                                                                    SHA1:452FDD974A9D63E05AC2F9AE4199CFD0C7CDCD62
                                                                                                                    SHA-256:5ABDEF24E5D651A400B36F57A109443BC4F1C975FDAEBB512ADE44935C8BEB1A
                                                                                                                    SHA-512:4F9E119EDA7FEED0948DABBDE51C9CBD835DB19EE717F3ED6EB99A16240EB351C968F4A8C39E8BCA2124A0E8A1C53AE5CD8A7D7F61748AFDE0574FF675166F43
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.\...............\.......................X...j.......................................................................LU.t................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i..................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):1.166433348209963
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:/hwCCRzCaCkClCzCYC/CyCVCGCMCvCACWCKECQCMCdC:/KF6
                                                                                                                    MD5:9AB3073B8BEBBC3C1E9DCB47217C8E27
                                                                                                                    SHA1:33477618A675262EFDC74FACE70AE448EE9CAA05
                                                                                                                    SHA-256:E19A280A63CB747D2029892A6F0E67D2C83461FF15112067AF24B8B5E136CC30
                                                                                                                    SHA-512:58DD3DECA39CBF605861F78EDD27F3F97858581322063E9F7F1169C9F190613A22649289959A525729F503643B5EFDF5C1C20EE43C21B69C9B4468BA0BDAD6F5
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.....................................04..h6............................................................................4................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................+................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):72368
                                                                                                                    Entropy (8bit):4.60963870067552
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:Ph9MmMutBM4TMyMGMOh9MmMutBM4TMyMGMDSKBKYKWKOKHxK/4KFKwKZKD4aKdK6:P9tF15x
                                                                                                                    MD5:F8B40313DE342B0E35D61A102B0548BD
                                                                                                                    SHA1:997AC59B09D6578ACA6E0D4B4DCB64F101D4AFDE
                                                                                                                    SHA-256:0B8AEF71A5F8D4A5D35D79AFFF944D7604D2F9FFB84154BB600EAC63E13029C9
                                                                                                                    SHA-512:119B04E30DBDBE7F4A4F9FD6A06A653A9BCDA7D7BE776B58C90245D4D8CCEF595720B1B280C1779F59F18600C84D0491F3B8A0090D4061F69DCEC05FDF9DD367
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk..%.......&.......%.......&..........x........@..................................................................................................................6...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................E...........&.......................................**.......%.......h.'fg.........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 15, DIRTY
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):79016
                                                                                                                    Entropy (8bit):1.821005777296527
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:y7hL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUm6UmaUmVAUm8UmkhL6UsE0Zi:8Y7L8oY7L8
                                                                                                                    MD5:F73D892AA99BAF0297984BDD5605B50F
                                                                                                                    SHA1:85BCB0CBC55BA0E87D447748198D658C80338CF5
                                                                                                                    SHA-256:8198B348D9B763A8959CAF34D4B18790A3923C461D6E6DC53E6626A7AF34FA95
                                                                                                                    SHA-512:0CD928FFE7B372D05A16BD7FCC749B1F039F9217C1821F9D84C327683A931249436F4BD008D1773568E4FF97347FA1E66A5E15083A2F69B8461570564E0CE5FD
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfFile.....................................................................................................................\>.eElfChnk......................................1..(4...i...................................................................../X-r................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................>-......................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):67776
                                                                                                                    Entropy (8bit):0.3676133553036576
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:MbVWd8iKrP+8QNRBEZWTENO4brBE3o9cU/6yxVWd8iKrP+8QNRBEZWTENO4brBEQ:qSNVaO8ioL/6yTSNVaO8ioL/6y
                                                                                                                    MD5:4D5DE4B46EAA9B9BB810C2254F762E30
                                                                                                                    SHA1:84634EC64E2C0BF8BB4A6F91468A38C2B79AFC39
                                                                                                                    SHA-256:C8FB02C63E708DB5EF6333FB3E5B499074ED90E91A2ABC6E376FED79CF4D6C87
                                                                                                                    SHA-512:1D48C5CB392830C16EAA868F63B9AEC744F6023739D80C373DA2CF55610A4BC8BB87EEF46268BFB4D1F8356CCAFF2F0171AADBE8570C10C36F89AA11F1E7B1E3
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.............................................=.O~....................................................................?.EY................".......................J...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**................n.g..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):1.9658503180918458
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:khHivRiLiakrkEi5iciMiHiQi8ixiBiFioikiFiixFiIMZifiwiLitixgZJiJi/P:kgtxHMa
                                                                                                                    MD5:9961A2C4F5AC430AB4FE55D69904E2C9
                                                                                                                    SHA1:BA49A1A12A889812148BECC8D5B285AD418D54FE
                                                                                                                    SHA-256:EAE8AAB4F398C27A8E7855C8524389EBE4F695B28D2B51E9EA916738D5E579E9
                                                                                                                    SHA-512:B7B0B29444E2B9BECCA18B96D5CA3D7098236C9919F7DE59A37405012C19C6B641CD3C1DA7E9E12F454004B93BB022F689125D31E26825929BB9A7D79FEF3199
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.y...............y................... d..0f.....6.....................................................................;.................>,..........................=.......................#.......................................>...........................................................f...............?.......................P.......................M...F...................................................9.......n(...............................................:...............,......................**......y..........a...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):87888
                                                                                                                    Entropy (8bit):3.631964198916393
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:iaYa4aMakaca4aUaoaYav4akaYaoa0aoaQaca4aga0aYaYawagagaAa8a0a4auX4:uLY
                                                                                                                    MD5:C02009B2660668C7D2F99CFC6E750550
                                                                                                                    SHA1:9308124472EBC9C83206FD06EEDAAFFD2C394BE4
                                                                                                                    SHA-256:4E688774F0745D8C2E096CE31A9CAA665CC5844953FFD7AF352032A499DDD1A4
                                                                                                                    SHA-512:157DEFFC5134FEC1BE12130F1348988350C364174A7F6C61720FD122A535FEE58E4EAEA8F57F0735190A18A8E317C14800366DD1F3E6D35D5D37FC35C0618AD7
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........@...............@...............`....A.......................................................................7..................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...;...................................**......#.......|...g..........Z..&...............................................................P.......h...C.!.................|...g...p........f.K...........#........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.U.A.C.-.F.i.l.e.V.i.r.t.u.a.l.i.z.a.t.i.o.n.+.*.N.ID.v...W^.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.U.A.C.-.F.i.l.e.V.i.r.t.u.a.l.i.z.a.t.i.o.n./.O.p.e.r.a.t.i.o.n.a.l...7..{;.......................r.......~...........................$.N......9.\.D.e.v.i
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):1.3650161876414235
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:2haXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJiXJtXJiXJWTXJpXJUXJ4XJ:2Q0yUkNYwD8imLEWTWW1fsg
                                                                                                                    MD5:346E087AE87A771402B2E38619AB7B71
                                                                                                                    SHA1:4B7EFEA99E401A5E6C0D115E2B27C48778704C13
                                                                                                                    SHA-256:82B60B9565D3FDA733EF5B4A6996AD51C08BC604BE6DC184255A8928B1220EE5
                                                                                                                    SHA-512:63C3EB568562AD3560924F7830F0ED120CC362A9FC24EA6CCE4B0EC5F90A0BBEF58539C26B5379A5E6D1939BED7D06A92B4A2521775AF2516793F42A289C0E4B
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk......................................A...D.....<....................................................................7...................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................6..........C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.335318634068108
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:ehRmsmRm1m4mXm9mSmBmStmtmimMmAmAmRmcmxHmEmqmwmHmLmlm9mGmdmpm3mfr:euDcxMmo
                                                                                                                    MD5:3B31610BEABB5895A19C346C64C234C6
                                                                                                                    SHA1:84316C06991A51AD91C247130B615F0E56CD4D01
                                                                                                                    SHA-256:EA4D4D4A4D56D42B0205793B2C9E45A732EA2F8909095BF924C2F4A138DE0404
                                                                                                                    SHA-512:2B9784678702654E8FA65456A501F9F6B48ABD575EE58264709A97FFF9C38C26C7A6ED9057278E1A090BBB4BD2F88FBC95E636D9DEE509142B67B4D81FBAB5A1
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk......................................'...(..'.D........................................................................R................L.......................t...=...........................................................................................................................f...............?...........................m...................M...F...............................................K...........................................%...............&.......................................**.................Hf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):0.7112352075765392
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:BV7VDiDL/bDiDwTDiDHDiDDDiDSDiD8DiDkDiD0DiDEDiDMDiDMDiDMDiD:BhV2nT2UT272/2+2w2g2w2I2o2A2I2
                                                                                                                    MD5:5D63AFB3EA60A7655FF95B4DB1B451E0
                                                                                                                    SHA1:B5D236316CC6617071D83D7E1B4367DDA1A889B1
                                                                                                                    SHA-256:815D1AE9187ED88319DDCD4F95D544E3B4FC3D12E2BF9A0DFD30441819089010
                                                                                                                    SHA-512:C00665A8527B92BB677696119894947DA47603CD1168B3536E7317E8D82C1A3563D50612C4AEF5BDEE75D491AEC97F8AB543F5FA1EB5E4080E7B1D8A55FE57E6
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.............................................u.=k....................................................................Z}#.................N.......................v...=...........................................................................................................................f...............?...........................m...................M...F...............................'...........................................................................&.......................................**.................sf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 9, DIRTY
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):69632
                                                                                                                    Entropy (8bit):1.276658066211496
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:rvEpP9JcY6+g4+Ga6oh+13xIb13xIb13xIt13xI:rspP9JcY6+g4+Ga6
                                                                                                                    MD5:DC25ADD8A6F26EFBBDC461611302C83F
                                                                                                                    SHA1:48BD8D39D6BD4BCE85D670429C15BC620B394152
                                                                                                                    SHA-256:18BE2F3D46D68481424DE066F1364D45EC8C9C55BC55E98FFD06857C26141AC9
                                                                                                                    SHA-512:2EA5A44BC4929BEB80020C7DE051E7EBB4341418A293404E29086A151BF02F80E0142D5C4047B1694E07F5551F6FB473EC68FDA277C69906F5B44CA66102280A
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfFile.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.361940141934218
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:g9ZhlR0CsRNH9RnR0ORpm3RZRRLR4zuZFRbmXR9XPRFrRXVRcrRb8RWRrR4QRSRZ:0Zi4DHm3X3NI538LMi
                                                                                                                    MD5:259ED3201A78F86065443851DBD48778
                                                                                                                    SHA1:5CDE9701EAA71605CD1F0D21C14024BCC9301C69
                                                                                                                    SHA-256:81DD034B4EC9A6A413712C7425877355BABB77FE5A8F3A9236D2049D804A0A91
                                                                                                                    SHA-512:D6208991569416257A9833326F6CF02E748F7346ABA019FB0F4B1EDE169876B81B6A2DEE06EA51A8BADD7122F4EF798E79BC4ECF1968261B70A4896391E56C1F
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.J.......Q.......J.......Q...........p%..0*..6_.!......................................................................^.....................C.......Q............(..=.......................................0"..d....................'..7#..........................................V(......(...f...+...........?....................... .......................M...F.......)(.......'..............................&............................................................&..................................*...**......J.........l.f..........'.z&........'.z..^................A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.282820835556058
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:chOhpuhdh+h9hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhr:cQsFpkBc1S
                                                                                                                    MD5:7DB7567819F7CFC6955126B8306826E6
                                                                                                                    SHA1:45CCB1C41CA1C6E1384207444A8B84437408DF1A
                                                                                                                    SHA-256:0DDCE2B5ADFAAB4EF8A1686D0064B8CCFF43B1D3C93893A62EF07B7FB896E8E5
                                                                                                                    SHA-512:FF5F662885580210B522215F56FD29417B6555F0878610D44D8F798E044876F99F86C5FF688BB77C92B894368E5DF32130B52BFE37401BACD3305B63463A2394
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........................................P.....Q................................................................................................................:...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...............!.......................**...............k..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):1.232783163157918
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVMV3VJmVhpVEVA:Zyjbj
                                                                                                                    MD5:71A005B17A2D32C10709277023D447E6
                                                                                                                    SHA1:14754F04007D539159F75D62AACC6A282CAA8D54
                                                                                                                    SHA-256:6E220C6CCBB76AEE639EDFCC6204C80EEC9FA1CCE0AC40EE4B821AF3AC27887B
                                                                                                                    SHA-512:BC3533B3DEF1BC8B7D990700CA573EFF57D05C4E72DF2BB536247466D5FE9EB5DFE6F2EC18F02C808449F998AC00E26E920E3984B4E8367F8E9AF188BD1D9518
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........!...............!............7..`8...).....................................................................Ce.~................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v................................................+......................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 5, DIRTY
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):4792
                                                                                                                    Entropy (8bit):4.031413139496865
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:EsVRNVaO8sow/sTYS5oz/sTf/sTpHZ/sTpb3rjjTF/sTz:EsdV7Xk8kozkDkNHZkNnvZkf
                                                                                                                    MD5:F2F7D767F32EA456FA23AF9F68823FD0
                                                                                                                    SHA1:D42A801AB09F58C021F3AB46CB0E99A3D32FF2DC
                                                                                                                    SHA-256:CE2C2C08C4268F697A4DE59A7355132D03B7EB5EA274B01DF918879CE29F6FDE
                                                                                                                    SHA-512:3DB505411D20307D10BC56C16668D2DECAE949CB3DF8A3777D8247AF9E5152B086FF6C22AFA43980956A299471ACD28E3DD96EACACDE31B2F3C90B12E4BE9318
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfFile......................................................................................................................RyNElfChnk.........................................8...h........................................................................zj................\...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................5...............&.......................................................................................**..............r..!..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.213395949522745
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:qhZBwBjsrBwBhBwBj4BwB6p+/4WBwBQ/cBwBjQNqObx13ABwBqhdBwBQ/LQBwBQo:qOsc6QNqObxGyS3qes
                                                                                                                    MD5:A208B4CFA6956737165D96729B289499
                                                                                                                    SHA1:4DDF00D30283CE21E63BF52808AECD56CC782C60
                                                                                                                    SHA-256:1EBFBC803748042ABDB923387A2FC52E0166BDB8C0CA185FE6D39C1A511FE59F
                                                                                                                    SHA-512:5BF0832B3D33310D1F6F8847DEECD43333F562CD1D2EA4AA515C3A0D48B67E5FA4961241BC5EBBA2A558BB9A335F6C3DCBF6702E14AE77BEC0953760A59064FA
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.^.......m.......^.......m...........@;..p>.....,....................................................................3^05............................................=...........................................................................................................................f...............?...........................m...................M...F...........................g...............................................................................&.......................................**.. ...^...........f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):65536
                                                                                                                    Entropy (8bit):4.414298413407747
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:3thQUE2UEFUE5UEKUEODUEzUEFUEsUE/UEGUE6UEWUE9UEtUEBUE8UEGUEuUE5UD:9w/RPoP6e
                                                                                                                    MD5:77D9AFD001F6BBD592C19652D671FEA3
                                                                                                                    SHA1:B87EA73299713B00D44A123C4B48636957EA90CE
                                                                                                                    SHA-256:E25E174DE18D3B90B5EBC3C394A7C6BFC34F3E27FB260758BC8CB135E4D45770
                                                                                                                    SHA-512:C81A545351015315060E812535A43C97A0FCBC2F49AA2034B50F963839F7F7DC1BC16EF070D5FF951E5FE82A9B315E8EFC20470707FD8C995A932E44369845E8
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.........................................8...,..t......................................................................>................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............._..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):102200
                                                                                                                    Entropy (8bit):4.330935587115988
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:qFRZFRTTjoNSg0PtocChoLu60zCwySonMt0SoHMtoLoHMtaoDoH5OD0obO9ZoJf+:M1PFj0Dyid9stqryVpxyUUZn2seQVJ
                                                                                                                    MD5:B964C46F62C7CBADF0222F886ACEF0DA
                                                                                                                    SHA1:1134AF0B29A97DFF5F7331EE1F1933A668AB420E
                                                                                                                    SHA-256:BE7D395B338B0A3197238618F9D653C1F0036006AB4055F12DEB02E36DE126FA
                                                                                                                    SHA-512:29F06F0DD3397455E7277812EA28A8F419BF6555746EACB7587DD1B688C432000E33293970F2BD2883ABAC3C6834AE33808CBAC595D5D0EB233E40638C31A2A2
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk......................................... ...Q........................................................................IT....................s...h...............N...=...................................................N...............................................w.......6......................./...................................]...........).......M...T...:...............................................................................................................&...............................**.. ............q@!fg..........*.&.........*.9.LS5..f....A.......A..5...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....^...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                    File Type:data
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):80416
                                                                                                                    Entropy (8bit):4.373536947946228
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:w6neo6nejMo46/iP6f/RfdRKe+PH+YekJ6nebFub:dGgMFfP67MPZdgus
                                                                                                                    MD5:F155B0D8C6C51E5613235B4E766226D8
                                                                                                                    SHA1:17490C50AA64ED18F254E0229E2925A5AC87031E
                                                                                                                    SHA-256:1F023D658CD9A627DE9ED51661C95CA6DF00A5CB25DE6A19A02C1D857067A141
                                                                                                                    SHA-512:77826ABC1C98CA3646B84AD1789F45D13B8334C8D8B43BD91FB18B2120599FDBDA68B0E1AFB5CEB0793A94F9735E2D38CC2A0B5CFFD270266B4B9E0DB21C8ADE
                                                                                                                    Malicious:false
                                                                                                                    Preview:ElfChnk.............................................X.p....................................................................._q6....................s...h...................=...................................................N...............................q...............w.......2.......................G...................................Y...........).......M...5...:........................................................................................................... .......................&...&.......**...............q@!fg.........#m.&........#m...].N.I.P.=.......A..1...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....Z...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                                                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):3751936
                                                                                                                    Entropy (8bit):7.965659720176834
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:98304:8DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:8DqPe1Cxcxk3ZAEUadzR8yc4H
                                                                                                                    MD5:80F63BEA8710636ED2F30EAD25E07C82
                                                                                                                    SHA1:333FF2D0719435F91D843BC742D650EFF0B37B42
                                                                                                                    SHA-256:2492B02A6A76B328F120BB3D6A9FAAC9661EAD831D57993CA7108F4FC6F81828
                                                                                                                    SHA-512:78F22CEE3B6390233AF846BB33EE5CF75123C723E78DCC5D8EABC8E5739BE3DCC8E4153664561C0033FE13E5079A487A9E5700BA4517F434CF016CA15E218F9C
                                                                                                                    Malicious:true
                                                                                                                    Yara Hits:
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                                                                                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                                                                                                    • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 96%
                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L...?..K.....................08.....".............@.......................... g......................................................1.. 6..........................................................................................................text............................... ..`.rdata..............................@..@.data....H0......p..................@....rsrc.... 6...1.. 6.. ..............`...........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    Process:C:\Windows\mssecsvc.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):3514368
                                                                                                                    Entropy (8bit):7.996072890929898
                                                                                                                    Encrypted:true
                                                                                                                    SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                                                                                                    MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                                                                    SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                                                                                                    SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                                                                                                    SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                                                                                                    Malicious:true
                                                                                                                    Yara Hits:
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                                                                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                                                                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 100%
                                                                                                                    Joe Sandbox View:
                                                                                                                    • Filename: JRTn7b1kHg.dll, Detection: malicious, Browse
                                                                                                                    • Filename: S8LDvVdtOk.dll, Detection: malicious, Browse
                                                                                                                    • Filename: 9nNO3SHiV1.dll, Detection: malicious, Browse
                                                                                                                    • Filename: zbRmQrzaHY.dll, Detection: malicious, Browse
                                                                                                                    • Filename: zyeX8bTkky.dll, Detection: malicious, Browse
                                                                                                                    • Filename: qt680eucI4.dll, Detection: malicious, Browse
                                                                                                                    • Filename: 1w3BDu68Sg.dll, Detection: malicious, Browse
                                                                                                                    • Filename: qCc1a4w5YZ.exe, Detection: malicious, Browse
                                                                                                                    • Filename: stN592INV6.exe, Detection: malicious, Browse
                                                                                                                    • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                    Entropy (8bit):6.448369724067446
                                                                                                                    TrID:
                                                                                                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                                                    • DOS Executable Generic (2002/1) 0.20%
                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                    File name:GeW4GzT8G8.dll
                                                                                                                    File size:5'267'459 bytes
                                                                                                                    MD5:78bd8b9c610315d7247e2076bbd9458c
                                                                                                                    SHA1:a8029cfe179dfc15c9a52ecd4ad491403dc1c1ae
                                                                                                                    SHA256:51d5805abb1d7fb68d037399193a5f1b019d23e455fe4a5b82d245a020b5b05b
                                                                                                                    SHA512:b6eabd7e04cd4d70edbd2f2e1b44f14fc27943b405334da0784bf2442ffcb4669de6c48fa54581045196803f975d1da86e59726afc86437827a1becc1354cdbc
                                                                                                                    SSDEEP:98304:NDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:NDqPe1Cxcxk3ZAEUadzR8yc4H
                                                                                                                    TLSH:1C363394612CB2FCF0450DB444638A6BB7B73C69A7BA4E1F9BC086660C53F5BAFD0641
                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                                                                                    Icon Hash:7ae282899bbab082
                                                                                                                    Entrypoint:0x100011e9
                                                                                                                    Entrypoint Section:.text
                                                                                                                    Digitally signed:false
                                                                                                                    Imagebase:0x10000000
                                                                                                                    Subsystem:windows gui
                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                                                                                    DLL Characteristics:
                                                                                                                    Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                                                                                    TLS Callbacks:
                                                                                                                    CLR (.Net) Version:
                                                                                                                    OS Version Major:4
                                                                                                                    OS Version Minor:0
                                                                                                                    File Version Major:4
                                                                                                                    File Version Minor:0
                                                                                                                    Subsystem Version Major:4
                                                                                                                    Subsystem Version Minor:0
                                                                                                                    Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                                                                                    Instruction
                                                                                                                    push ebp
                                                                                                                    mov ebp, esp
                                                                                                                    push ebx
                                                                                                                    mov ebx, dword ptr [ebp+08h]
                                                                                                                    push esi
                                                                                                                    mov esi, dword ptr [ebp+0Ch]
                                                                                                                    push edi
                                                                                                                    mov edi, dword ptr [ebp+10h]
                                                                                                                    test esi, esi
                                                                                                                    jne 00007FAF7CEEFA0Bh
                                                                                                                    cmp dword ptr [10003140h], 00000000h
                                                                                                                    jmp 00007FAF7CEEFA28h
                                                                                                                    cmp esi, 01h
                                                                                                                    je 00007FAF7CEEFA07h
                                                                                                                    cmp esi, 02h
                                                                                                                    jne 00007FAF7CEEFA24h
                                                                                                                    mov eax, dword ptr [10003150h]
                                                                                                                    test eax, eax
                                                                                                                    je 00007FAF7CEEFA0Bh
                                                                                                                    push edi
                                                                                                                    push esi
                                                                                                                    push ebx
                                                                                                                    call eax
                                                                                                                    test eax, eax
                                                                                                                    je 00007FAF7CEEFA0Eh
                                                                                                                    push edi
                                                                                                                    push esi
                                                                                                                    push ebx
                                                                                                                    call 00007FAF7CEEF91Ah
                                                                                                                    test eax, eax
                                                                                                                    jne 00007FAF7CEEFA06h
                                                                                                                    xor eax, eax
                                                                                                                    jmp 00007FAF7CEEFA50h
                                                                                                                    push edi
                                                                                                                    push esi
                                                                                                                    push ebx
                                                                                                                    call 00007FAF7CEEF7CCh
                                                                                                                    cmp esi, 01h
                                                                                                                    mov dword ptr [ebp+0Ch], eax
                                                                                                                    jne 00007FAF7CEEFA0Eh
                                                                                                                    test eax, eax
                                                                                                                    jne 00007FAF7CEEFA39h
                                                                                                                    push edi
                                                                                                                    push eax
                                                                                                                    push ebx
                                                                                                                    call 00007FAF7CEEF8F6h
                                                                                                                    test esi, esi
                                                                                                                    je 00007FAF7CEEFA07h
                                                                                                                    cmp esi, 03h
                                                                                                                    jne 00007FAF7CEEFA28h
                                                                                                                    push edi
                                                                                                                    push esi
                                                                                                                    push ebx
                                                                                                                    call 00007FAF7CEEF8E5h
                                                                                                                    test eax, eax
                                                                                                                    jne 00007FAF7CEEFA05h
                                                                                                                    and dword ptr [ebp+0Ch], eax
                                                                                                                    cmp dword ptr [ebp+0Ch], 00000000h
                                                                                                                    je 00007FAF7CEEFA13h
                                                                                                                    mov eax, dword ptr [10003150h]
                                                                                                                    test eax, eax
                                                                                                                    je 00007FAF7CEEFA0Ah
                                                                                                                    push edi
                                                                                                                    push esi
                                                                                                                    push ebx
                                                                                                                    call eax
                                                                                                                    mov dword ptr [ebp+0Ch], eax
                                                                                                                    mov eax, dword ptr [ebp+0Ch]
                                                                                                                    pop edi
                                                                                                                    pop esi
                                                                                                                    pop ebx
                                                                                                                    pop ebp
                                                                                                                    retn 000Ch
                                                                                                                    jmp dword ptr [10002028h]
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    Programming Language:
                                                                                                                    • [ C ] VS98 (6.0) build 8168
                                                                                                                    • [C++] VS98 (6.0) build 8168
                                                                                                                    • [RES] VS98 (6.0) cvtres build 1720
                                                                                                                    • [LNK] VS98 (6.0) imp/exp build 8168
                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                    .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                    .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                    .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                    .rsrc0x40000x5000600x5010000d974739789faeadcad5565b969a79a7unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                    .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                    W0x40600x500000dataEnglishUnited States0.8778753280639648
                                                                                                                    DLLImport
                                                                                                                    KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                                                                                    MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                                                                                    NameOrdinalAddress
                                                                                                                    PlayGame10x10001114
                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                    EnglishUnited States
                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                    2025-01-15T16:57:15.577268+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.8637611.1.1.153UDP
                                                                                                                    2025-01-15T16:57:16.080006+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849704104.16.166.22880TCP
                                                                                                                    2025-01-15T16:57:16.080006+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849704104.16.166.22880TCP
                                                                                                                    2025-01-15T16:57:16.080006+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849704104.16.166.22880TCP
                                                                                                                    2025-01-15T16:57:16.080006+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849704104.16.166.22880TCP
                                                                                                                    2025-01-15T16:57:16.080006+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849704104.16.166.22880TCP
                                                                                                                    2025-01-15T16:57:16.080806+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.849704TCP
                                                                                                                    2025-01-15T16:57:25.556934+01002012730ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup1192.168.2.8643201.1.1.153UDP
                                                                                                                    2025-01-15T16:57:28.691144+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.8641821.1.1.153UDP
                                                                                                                    2025-01-15T16:57:29.208532+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849710104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.208532+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849710104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.208532+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849710104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.208532+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849710104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.208532+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849710104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.210203+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849710TCP
                                                                                                                    2025-01-15T16:57:29.292333+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849711104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.292333+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849711104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.292333+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849711104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.292333+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849711104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.292333+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849711104.16.167.22880TCP
                                                                                                                    2025-01-15T16:57:29.298854+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849711TCP
                                                                                                                    2025-01-15T16:58:17.011779+01002012730ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup1192.168.2.8617241.1.1.153UDP
                                                                                                                    2025-01-15T16:58:25.678068+01002811577ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com)11.1.1.153192.168.2.853292UDP
                                                                                                                    2025-01-15T16:58:48.953187+01002811577ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com)11.1.1.153192.168.2.861145UDP
                                                                                                                    2025-01-15T16:59:06.237534+01002811577ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com)11.1.1.153192.168.2.861597UDP
                                                                                                                    2025-01-15T16:59:08.402519+01002012730ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup1192.168.2.8634091.1.1.153UDP
                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Jan 15, 2025 16:57:05.948460102 CET49673443192.168.2.823.206.229.226
                                                                                                                    Jan 15, 2025 16:57:06.307770967 CET49672443192.168.2.823.206.229.226
                                                                                                                    Jan 15, 2025 16:57:10.885916948 CET49676443192.168.2.852.182.143.211
                                                                                                                    Jan 15, 2025 16:57:13.510910988 CET4967780192.168.2.8192.229.211.108
                                                                                                                    Jan 15, 2025 16:57:15.559555054 CET49673443192.168.2.823.206.229.226
                                                                                                                    Jan 15, 2025 16:57:15.597143888 CET4970480192.168.2.8104.16.166.228
                                                                                                                    Jan 15, 2025 16:57:15.602000952 CET8049704104.16.166.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:15.602114916 CET4970480192.168.2.8104.16.166.228
                                                                                                                    Jan 15, 2025 16:57:15.602371931 CET4970480192.168.2.8104.16.166.228
                                                                                                                    Jan 15, 2025 16:57:15.607300043 CET8049704104.16.166.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:15.917129993 CET49672443192.168.2.823.206.229.226
                                                                                                                    Jan 15, 2025 16:57:16.079792023 CET8049704104.16.166.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:16.080005884 CET4970480192.168.2.8104.16.166.228
                                                                                                                    Jan 15, 2025 16:57:16.080005884 CET4970480192.168.2.8104.16.166.228
                                                                                                                    Jan 15, 2025 16:57:16.080806017 CET8049704104.16.166.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:16.081187963 CET4970480192.168.2.8104.16.166.228
                                                                                                                    Jan 15, 2025 16:57:16.086117029 CET8049704104.16.166.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:17.643824100 CET4434970323.206.229.226192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:17.643917084 CET49703443192.168.2.823.206.229.226
                                                                                                                    Jan 15, 2025 16:57:25.575793982 CET4970780192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.580702066 CET804970788.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:25.580775023 CET4970780192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.580888987 CET4970780192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.585639954 CET804970788.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:25.585820913 CET4970780192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.590574980 CET804970788.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:25.658787966 CET4970880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.663678885 CET804970888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:25.663747072 CET4970880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.663785934 CET4970880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.668540001 CET804970888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:25.668581009 CET4970880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:25.673368931 CET804970888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:28.716026068 CET4971080192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:28.720879078 CET8049710104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:28.724864006 CET4971080192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:28.726372004 CET4971080192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:28.731149912 CET8049710104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:28.789351940 CET4971180192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:28.794138908 CET8049711104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:28.794229031 CET4971180192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:28.794615030 CET4971180192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:28.799340010 CET8049711104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.208458900 CET8049710104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.208532095 CET4971080192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:29.208648920 CET4971080192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:29.210202932 CET8049710104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.210249901 CET4971080192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:29.213363886 CET8049710104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.292155027 CET8049711104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.292316914 CET8049711104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.292332888 CET4971180192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:29.292365074 CET4971180192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:29.294111013 CET4971180192.168.2.8104.16.167.228
                                                                                                                    Jan 15, 2025 16:57:29.298854113 CET8049711104.16.167.228192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.328969002 CET49712445192.168.2.8203.228.45.4
                                                                                                                    Jan 15, 2025 16:57:29.333750010 CET44549712203.228.45.4192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.333841085 CET49712445192.168.2.8203.228.45.4
                                                                                                                    Jan 15, 2025 16:57:29.334635019 CET49712445192.168.2.8203.228.45.4
                                                                                                                    Jan 15, 2025 16:57:29.334827900 CET49713445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:29.339432955 CET44549712203.228.45.4192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.339482069 CET49712445192.168.2.8203.228.45.4
                                                                                                                    Jan 15, 2025 16:57:29.339592934 CET44549713203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.339683056 CET49713445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:29.339809895 CET49713445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:29.344729900 CET44549713203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.344791889 CET49713445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:29.358371973 CET49714445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:29.363142014 CET44549714203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:29.363281012 CET49714445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:29.363368988 CET49714445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:29.368129969 CET44549714203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:31.262269974 CET49738445192.168.2.8209.135.205.16
                                                                                                                    Jan 15, 2025 16:57:31.267087936 CET44549738209.135.205.16192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:31.267147064 CET49738445192.168.2.8209.135.205.16
                                                                                                                    Jan 15, 2025 16:57:31.267239094 CET49738445192.168.2.8209.135.205.16
                                                                                                                    Jan 15, 2025 16:57:31.267482042 CET49739445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:31.272090912 CET44549738209.135.205.16192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:31.272134066 CET49738445192.168.2.8209.135.205.16
                                                                                                                    Jan 15, 2025 16:57:31.272723913 CET44549739209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:31.272770882 CET49739445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:31.272849083 CET49739445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:31.273914099 CET49740445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:31.277851105 CET44549739209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:31.277906895 CET49739445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:31.279134035 CET44549740209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:31.279198885 CET49740445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:31.279248953 CET49740445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:31.284250975 CET44549740209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:33.278446913 CET49764445192.168.2.8198.232.135.223
                                                                                                                    Jan 15, 2025 16:57:33.283343077 CET44549764198.232.135.223192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:33.283411980 CET49764445192.168.2.8198.232.135.223
                                                                                                                    Jan 15, 2025 16:57:33.283504009 CET49764445192.168.2.8198.232.135.223
                                                                                                                    Jan 15, 2025 16:57:33.283668041 CET49765445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:33.288306952 CET44549764198.232.135.223192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:33.288400888 CET49764445192.168.2.8198.232.135.223
                                                                                                                    Jan 15, 2025 16:57:33.288667917 CET44549765198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:33.288723946 CET49765445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:33.288790941 CET49765445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:33.289866924 CET49766445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:33.293806076 CET44549765198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:33.293859005 CET49765445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:33.294673920 CET44549766198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:33.294737101 CET49766445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:33.294802904 CET49766445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:33.299581051 CET44549766198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:35.305922031 CET49787445192.168.2.8112.84.177.245
                                                                                                                    Jan 15, 2025 16:57:35.310950994 CET44549787112.84.177.245192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:35.312793016 CET49787445192.168.2.8112.84.177.245
                                                                                                                    Jan 15, 2025 16:57:35.314167976 CET49787445192.168.2.8112.84.177.245
                                                                                                                    Jan 15, 2025 16:57:35.314409018 CET49788445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:35.318979979 CET44549787112.84.177.245192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:35.319217920 CET49787445192.168.2.8112.84.177.245
                                                                                                                    Jan 15, 2025 16:57:35.319235086 CET44549788112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:35.319372892 CET49788445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:35.324702978 CET49788445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:35.329513073 CET44549788112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:35.329567909 CET49788445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:35.390547991 CET49789445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:35.395572901 CET44549789112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:35.395725012 CET49789445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:35.407634020 CET49789445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:35.412414074 CET44549789112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:37.341068029 CET49812445192.168.2.8201.202.46.145
                                                                                                                    Jan 15, 2025 16:57:37.346199036 CET44549812201.202.46.145192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:37.346307039 CET49812445192.168.2.8201.202.46.145
                                                                                                                    Jan 15, 2025 16:57:37.346358061 CET49812445192.168.2.8201.202.46.145
                                                                                                                    Jan 15, 2025 16:57:37.346543074 CET49813445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:37.351360083 CET44549813201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:37.351389885 CET44549812201.202.46.145192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:37.351417065 CET49813445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:37.351440907 CET49812445192.168.2.8201.202.46.145
                                                                                                                    Jan 15, 2025 16:57:37.351511955 CET49813445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:37.352432013 CET49814445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:37.356832981 CET44549813201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:37.356998920 CET49813445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:37.359389067 CET44549814201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:37.359457970 CET49814445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:37.359520912 CET49814445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:37.364280939 CET44549814201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:39.360675097 CET49837445192.168.2.869.111.126.153
                                                                                                                    Jan 15, 2025 16:57:39.365678072 CET4454983769.111.126.153192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:39.365756035 CET49837445192.168.2.869.111.126.153
                                                                                                                    Jan 15, 2025 16:57:39.365827084 CET49837445192.168.2.869.111.126.153
                                                                                                                    Jan 15, 2025 16:57:39.366070032 CET49838445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:57:39.371361017 CET4454983769.111.126.153192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:39.371386051 CET4454983869.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:39.371426105 CET49837445192.168.2.869.111.126.153
                                                                                                                    Jan 15, 2025 16:57:39.371474981 CET49838445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:57:39.386249065 CET49838445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:57:39.387459040 CET49839445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:57:39.391181946 CET4454983869.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:39.391269922 CET49838445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:57:39.392381907 CET4454983969.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:39.392466068 CET49839445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:57:39.394581079 CET49839445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:57:39.399766922 CET4454983969.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:41.370906115 CET49862445192.168.2.8200.214.167.67
                                                                                                                    Jan 15, 2025 16:57:41.375955105 CET44549862200.214.167.67192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:41.376163960 CET49862445192.168.2.8200.214.167.67
                                                                                                                    Jan 15, 2025 16:57:41.376255035 CET49862445192.168.2.8200.214.167.67
                                                                                                                    Jan 15, 2025 16:57:41.376409054 CET49863445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:57:41.381201982 CET44549862200.214.167.67192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:41.381278038 CET49862445192.168.2.8200.214.167.67
                                                                                                                    Jan 15, 2025 16:57:41.381283045 CET44549863200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:41.381330967 CET49863445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:57:41.381387949 CET49863445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:57:41.381617069 CET49864445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:57:41.386214972 CET44549863200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:41.386269093 CET49863445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:57:41.386488914 CET44549864200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:41.386544943 CET49864445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:57:41.386576891 CET49864445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:57:41.391382933 CET44549864200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:43.386440992 CET49886445192.168.2.884.147.160.132
                                                                                                                    Jan 15, 2025 16:57:43.391659975 CET4454988684.147.160.132192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:43.391779900 CET49886445192.168.2.884.147.160.132
                                                                                                                    Jan 15, 2025 16:57:43.391841888 CET49886445192.168.2.884.147.160.132
                                                                                                                    Jan 15, 2025 16:57:43.391932964 CET49887445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:57:43.396877050 CET4454988684.147.160.132192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:43.396912098 CET4454988784.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:43.397120953 CET49887445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:57:43.397120953 CET49887445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:57:43.397129059 CET49886445192.168.2.884.147.160.132
                                                                                                                    Jan 15, 2025 16:57:43.397224903 CET49888445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:57:43.402173042 CET4454988884.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:43.402201891 CET4454988784.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:43.402226925 CET49888445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:57:43.402250051 CET49887445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:57:43.402271032 CET49888445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:57:43.407119989 CET4454988884.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:45.402041912 CET49911445192.168.2.875.165.172.241
                                                                                                                    Jan 15, 2025 16:57:45.407025099 CET4454991175.165.172.241192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:45.407114983 CET49911445192.168.2.875.165.172.241
                                                                                                                    Jan 15, 2025 16:57:45.407176018 CET49911445192.168.2.875.165.172.241
                                                                                                                    Jan 15, 2025 16:57:45.407282114 CET49912445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:57:45.412139893 CET4454991175.165.172.241192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:45.412156105 CET4454991275.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:45.412208080 CET49911445192.168.2.875.165.172.241
                                                                                                                    Jan 15, 2025 16:57:45.412226915 CET49912445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:57:45.412307978 CET49912445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:57:45.412509918 CET49913445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:57:45.417227983 CET4454991275.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:45.417283058 CET49912445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:57:45.417309046 CET4454991375.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:45.417357922 CET49913445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:57:45.417392015 CET49913445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:57:45.422197104 CET4454991375.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.006555080 CET804970788.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.006618023 CET4970780192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:47.006649971 CET4970780192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:47.011409998 CET804970788.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.086174011 CET804970888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.086246967 CET4970880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:47.086272955 CET4970880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:57:47.091080904 CET804970888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.418009043 CET49936445192.168.2.88.188.251.4
                                                                                                                    Jan 15, 2025 16:57:47.422929049 CET445499368.188.251.4192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.423037052 CET49936445192.168.2.88.188.251.4
                                                                                                                    Jan 15, 2025 16:57:47.423094988 CET49936445192.168.2.88.188.251.4
                                                                                                                    Jan 15, 2025 16:57:47.425647020 CET49937445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:57:47.428179026 CET445499368.188.251.4192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.428250074 CET49936445192.168.2.88.188.251.4
                                                                                                                    Jan 15, 2025 16:57:47.430552959 CET445499378.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.430748940 CET49937445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:57:47.430748940 CET49937445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:57:47.430826902 CET49938445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:57:47.435612917 CET445499378.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.435623884 CET445499388.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.435700893 CET49938445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:57:47.435715914 CET49938445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:57:47.435966015 CET445499378.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:47.436033964 CET49937445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:57:47.441288948 CET445499388.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:49.433335066 CET49960445192.168.2.846.252.194.170
                                                                                                                    Jan 15, 2025 16:57:49.438294888 CET4454996046.252.194.170192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:49.438416958 CET49960445192.168.2.846.252.194.170
                                                                                                                    Jan 15, 2025 16:57:49.438561916 CET49960445192.168.2.846.252.194.170
                                                                                                                    Jan 15, 2025 16:57:49.438729048 CET49961445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:57:49.443409920 CET4454996046.252.194.170192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:49.443514109 CET49960445192.168.2.846.252.194.170
                                                                                                                    Jan 15, 2025 16:57:49.443643093 CET4454996146.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:49.443700075 CET49961445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:57:49.443767071 CET49961445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:57:49.444031954 CET49962445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:57:49.448666096 CET4454996146.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:49.448750019 CET49961445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:57:49.448795080 CET4454996246.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:49.448859930 CET49962445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:57:49.448894024 CET49962445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:57:49.453653097 CET4454996246.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:50.730693102 CET44549714203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:50.730798960 CET49714445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:50.730894089 CET49714445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:50.730923891 CET49714445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:50.735872984 CET44549714203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:50.735905886 CET44549714203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:51.449213028 CET49984445192.168.2.840.249.82.97
                                                                                                                    Jan 15, 2025 16:57:51.454988003 CET4454998440.249.82.97192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:51.455060005 CET49984445192.168.2.840.249.82.97
                                                                                                                    Jan 15, 2025 16:57:51.455147028 CET49984445192.168.2.840.249.82.97
                                                                                                                    Jan 15, 2025 16:57:51.455342054 CET49985445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:57:51.460170984 CET4454998440.249.82.97192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:51.460246086 CET49984445192.168.2.840.249.82.97
                                                                                                                    Jan 15, 2025 16:57:51.460268974 CET4454998540.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:51.460349083 CET49985445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:57:51.460434914 CET49985445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:57:51.460725069 CET49986445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:57:51.465428114 CET4454998540.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:51.465493917 CET49985445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:57:51.465547085 CET4454998640.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:51.465606928 CET49986445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:57:51.465656996 CET49986445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:57:51.470418930 CET4454998640.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:52.646233082 CET44549740209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:52.647345066 CET49740445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:52.647345066 CET49740445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:52.647459984 CET49740445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:52.652440071 CET44549740209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:52.652451038 CET44549740209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.465209007 CET50009445192.168.2.89.166.247.19
                                                                                                                    Jan 15, 2025 16:57:53.470076084 CET445500099.166.247.19192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.470148087 CET50009445192.168.2.89.166.247.19
                                                                                                                    Jan 15, 2025 16:57:53.470240116 CET50009445192.168.2.89.166.247.19
                                                                                                                    Jan 15, 2025 16:57:53.470388889 CET50010445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:57:53.476186037 CET445500109.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.476278067 CET50010445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:57:53.476424932 CET50010445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:57:53.476475000 CET445500099.166.247.19192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.476530075 CET50009445192.168.2.89.166.247.19
                                                                                                                    Jan 15, 2025 16:57:53.476749897 CET50011445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:57:53.481504917 CET445500109.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.481594086 CET50010445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:57:53.481642008 CET445500119.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.481725931 CET50011445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:57:53.481770992 CET50011445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:57:53.487029076 CET445500119.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.746059895 CET50015445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:53.751154900 CET44550015203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:53.751276016 CET50015445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:53.751322985 CET50015445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:57:53.756187916 CET44550015203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:54.680309057 CET44549766198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:54.680388927 CET49766445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:54.680480957 CET49766445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:54.680574894 CET49766445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:54.686465025 CET44549766198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:54.686480045 CET44549766198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.480473995 CET50016445192.168.2.838.185.147.195
                                                                                                                    Jan 15, 2025 16:57:55.486910105 CET4455001638.185.147.195192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.486989021 CET50016445192.168.2.838.185.147.195
                                                                                                                    Jan 15, 2025 16:57:55.487086058 CET50016445192.168.2.838.185.147.195
                                                                                                                    Jan 15, 2025 16:57:55.487288952 CET50017445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:57:55.492927074 CET4455001738.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.493017912 CET50017445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:57:55.493097067 CET50017445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:57:55.493490934 CET50018445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:57:55.493969917 CET4455001638.185.147.195192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.494026899 CET50016445192.168.2.838.185.147.195
                                                                                                                    Jan 15, 2025 16:57:55.499133110 CET4455001838.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.499198914 CET50018445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:57:55.499264956 CET50018445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:57:55.499294043 CET4455001738.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.499341965 CET50017445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:57:55.505173922 CET4455001838.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.651917934 CET50019445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:55.657645941 CET44550019209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:55.657752037 CET50019445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:55.657800913 CET50019445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:57:55.662647009 CET44550019209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:56.756516933 CET44549789112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:56.756671906 CET49789445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:56.756783962 CET49789445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:56.756886959 CET49789445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:56.763418913 CET44549789112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:56.763432980 CET44549789112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.495898008 CET50020445192.168.2.8158.94.246.103
                                                                                                                    Jan 15, 2025 16:57:57.500854015 CET44550020158.94.246.103192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.501055002 CET50020445192.168.2.8158.94.246.103
                                                                                                                    Jan 15, 2025 16:57:57.501055002 CET50020445192.168.2.8158.94.246.103
                                                                                                                    Jan 15, 2025 16:57:57.501127005 CET50021445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:57:57.505916119 CET44550021158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.505983114 CET50021445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:57:57.506011963 CET50021445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:57:57.506184101 CET50022445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:57:57.506371021 CET44550020158.94.246.103192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.506438017 CET50020445192.168.2.8158.94.246.103
                                                                                                                    Jan 15, 2025 16:57:57.511001110 CET44550022158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.511055946 CET44550021158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.511059046 CET50022445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:57:57.511082888 CET50022445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:57:57.511104107 CET50021445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:57:57.515868902 CET44550022158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.690279007 CET50023445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:57.695193052 CET44550023198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:57.695271015 CET50023445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:57.700252056 CET50023445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:57:57.705063105 CET44550023198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:58.710954905 CET44549814201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:58.711095095 CET49814445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:58.711218119 CET49814445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:58.711289883 CET49814445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:57:58.715990067 CET44549814201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:58.720864058 CET44549814201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.511548996 CET50024445192.168.2.8176.122.86.146
                                                                                                                    Jan 15, 2025 16:57:59.516486883 CET44550024176.122.86.146192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.516578913 CET50024445192.168.2.8176.122.86.146
                                                                                                                    Jan 15, 2025 16:57:59.516657114 CET50024445192.168.2.8176.122.86.146
                                                                                                                    Jan 15, 2025 16:57:59.516762972 CET50025445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:57:59.521552086 CET44550025176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.521614075 CET44550024176.122.86.146192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.521627903 CET50025445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:57:59.521676064 CET50024445192.168.2.8176.122.86.146
                                                                                                                    Jan 15, 2025 16:57:59.521753073 CET50025445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:57:59.521944046 CET50026445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:57:59.526779890 CET44550026176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.526791096 CET44550025176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.526840925 CET50025445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:57:59.526859999 CET50026445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:57:59.527013063 CET50026445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:57:59.532139063 CET44550026176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.761435986 CET50027445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:59.766509056 CET44550027112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:59.766604900 CET50027445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:59.766654015 CET50027445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:57:59.771486998 CET44550027112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:00.759284019 CET4454983969.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:00.759366035 CET49839445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:00.759442091 CET49839445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:00.759500027 CET49839445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:00.764278889 CET4454983969.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:00.764288902 CET4454983969.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.527306080 CET50028445192.168.2.832.252.86.6
                                                                                                                    Jan 15, 2025 16:58:01.532242060 CET4455002832.252.86.6192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.532332897 CET50028445192.168.2.832.252.86.6
                                                                                                                    Jan 15, 2025 16:58:01.532402039 CET50028445192.168.2.832.252.86.6
                                                                                                                    Jan 15, 2025 16:58:01.532506943 CET50029445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:01.537300110 CET4455002832.252.86.6192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.537328005 CET4455002932.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.537355900 CET50028445192.168.2.832.252.86.6
                                                                                                                    Jan 15, 2025 16:58:01.537395000 CET50029445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:01.537434101 CET50029445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:01.537599087 CET50030445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:01.542377949 CET4455003032.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.542435884 CET50030445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:01.542450905 CET50030445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:01.542709112 CET4455002932.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.542762995 CET50029445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:01.547224998 CET4455003032.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.714879036 CET50031445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:58:01.719789028 CET44550031201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:01.719872952 CET50031445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:58:01.719903946 CET50031445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:58:01.724689960 CET44550031201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:02.792926073 CET44549864200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:02.792995930 CET49864445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:02.797883034 CET49864445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:02.797929049 CET49864445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:02.802841902 CET44549864200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:02.802879095 CET44549864200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.551973104 CET50032445192.168.2.888.63.225.125
                                                                                                                    Jan 15, 2025 16:58:03.556956053 CET4455003288.63.225.125192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.557039976 CET50032445192.168.2.888.63.225.125
                                                                                                                    Jan 15, 2025 16:58:03.557126045 CET50032445192.168.2.888.63.225.125
                                                                                                                    Jan 15, 2025 16:58:03.557285070 CET50033445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:03.562182903 CET4455003288.63.225.125192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.562222958 CET4455003388.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.562252045 CET50032445192.168.2.888.63.225.125
                                                                                                                    Jan 15, 2025 16:58:03.562302113 CET50033445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:03.562365055 CET50033445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:03.562649965 CET50034445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:03.567229986 CET4455003388.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.567291021 CET50033445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:03.567456007 CET4455003488.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.567507982 CET50034445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:03.567532063 CET50034445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:03.572272062 CET4455003488.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.761389971 CET50035445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:03.766367912 CET4455003569.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:03.766453028 CET50035445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:03.766508102 CET50035445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:03.771328926 CET4455003569.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:04.787882090 CET4454988884.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:04.788156986 CET49888445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:04.788157940 CET49888445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:04.788157940 CET49888445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:04.793045044 CET4454988884.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:04.793061018 CET4454988884.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.433342934 CET50036445192.168.2.857.162.85.15
                                                                                                                    Jan 15, 2025 16:58:05.438497066 CET4455003657.162.85.15192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.438584089 CET50036445192.168.2.857.162.85.15
                                                                                                                    Jan 15, 2025 16:58:05.438697100 CET50036445192.168.2.857.162.85.15
                                                                                                                    Jan 15, 2025 16:58:05.438810110 CET50037445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:05.443603992 CET4455003657.162.85.15192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.443676949 CET50036445192.168.2.857.162.85.15
                                                                                                                    Jan 15, 2025 16:58:05.443701029 CET4455003757.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.443764925 CET50037445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:05.443820000 CET50037445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:05.444000959 CET50038445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:05.448762894 CET4455003757.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.448818922 CET4455003857.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.448826075 CET50037445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:05.448880911 CET50038445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:05.448909998 CET50038445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:05.453797102 CET4455003857.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.808027983 CET50039445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:05.813433886 CET44550039200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:05.813512087 CET50039445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:05.813611984 CET50039445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:05.819003105 CET44550039200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:06.804866076 CET4454991375.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:06.805038929 CET49913445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:06.806579113 CET49913445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:06.806632042 CET49913445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:06.811463118 CET4454991375.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:06.811472893 CET4454991375.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.194464922 CET50040445192.168.2.8153.101.17.35
                                                                                                                    Jan 15, 2025 16:58:07.199558020 CET44550040153.101.17.35192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.199640036 CET50040445192.168.2.8153.101.17.35
                                                                                                                    Jan 15, 2025 16:58:07.200445890 CET50040445192.168.2.8153.101.17.35
                                                                                                                    Jan 15, 2025 16:58:07.200604916 CET50041445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:07.205516100 CET44550041153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.205599070 CET50041445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:07.207653999 CET44550040153.101.17.35192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.209244013 CET44550040153.101.17.35192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.209306002 CET50040445192.168.2.8153.101.17.35
                                                                                                                    Jan 15, 2025 16:58:07.224458933 CET50041445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:07.224699974 CET50042445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:07.229371071 CET44550041153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.229437113 CET50041445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:07.229573011 CET44550042153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.229638100 CET50042445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:07.231707096 CET50042445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:07.236586094 CET44550042153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.792459011 CET50043445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:07.797503948 CET4455004384.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:07.797602892 CET50043445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:07.797632933 CET50043445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:07.802434921 CET4455004384.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.803726912 CET445499388.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.803924084 CET49938445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:08.803924084 CET49938445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:08.803924084 CET49938445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:08.809001923 CET445499388.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.809032917 CET445499388.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.824017048 CET50044445192.168.2.828.183.62.137
                                                                                                                    Jan 15, 2025 16:58:08.829591990 CET4455004428.183.62.137192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.829685926 CET50044445192.168.2.828.183.62.137
                                                                                                                    Jan 15, 2025 16:58:08.829777956 CET50044445192.168.2.828.183.62.137
                                                                                                                    Jan 15, 2025 16:58:08.829917908 CET50045445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:08.835001945 CET4455004528.183.62.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.835078001 CET50045445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:08.835125923 CET50045445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:08.835293055 CET50046445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:08.835413933 CET4455004428.183.62.137192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.835474014 CET50044445192.168.2.828.183.62.137
                                                                                                                    Jan 15, 2025 16:58:08.840450048 CET4455004628.183.62.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.840513945 CET50046445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:08.840544939 CET50046445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:08.843343019 CET4455004528.183.62.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:08.843409061 CET50045445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:08.845834970 CET4455004628.183.62.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:09.874392986 CET50047445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:09.879470110 CET4455004775.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:09.879554987 CET50047445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:09.879614115 CET50047445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:09.884421110 CET4455004775.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.355282068 CET50048445192.168.2.891.57.194.122
                                                                                                                    Jan 15, 2025 16:58:10.360485077 CET4455004891.57.194.122192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.360671997 CET50048445192.168.2.891.57.194.122
                                                                                                                    Jan 15, 2025 16:58:10.360760927 CET50048445192.168.2.891.57.194.122
                                                                                                                    Jan 15, 2025 16:58:10.360909939 CET50049445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:10.365725994 CET4455004991.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.365812063 CET50049445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:10.365880013 CET50049445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:10.366122961 CET50050445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:10.367618084 CET4455004891.57.194.122192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.369611025 CET4455004891.57.194.122192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.369687080 CET50048445192.168.2.891.57.194.122
                                                                                                                    Jan 15, 2025 16:58:10.371056080 CET4455005091.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.371129036 CET50050445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:10.371172905 CET50050445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:10.371607065 CET4455004991.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.371989965 CET4455004991.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.372041941 CET50049445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:10.375977039 CET4455005091.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.803478956 CET4454996246.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.803575993 CET49962445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:10.803612947 CET49962445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:10.803684950 CET49962445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:10.808567047 CET4454996246.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:10.808599949 CET4454996246.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.780072927 CET50051445192.168.2.89.32.108.207
                                                                                                                    Jan 15, 2025 16:58:11.785181046 CET445500519.32.108.207192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.785255909 CET50051445192.168.2.89.32.108.207
                                                                                                                    Jan 15, 2025 16:58:11.785325050 CET50051445192.168.2.89.32.108.207
                                                                                                                    Jan 15, 2025 16:58:11.785485029 CET50052445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:11.790440083 CET445500529.32.108.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.790456057 CET445500519.32.108.207192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.790572882 CET50051445192.168.2.89.32.108.207
                                                                                                                    Jan 15, 2025 16:58:11.790575027 CET50052445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:11.803527117 CET50052445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:11.803908110 CET50053445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:11.808490992 CET445500529.32.108.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.808845997 CET445500539.32.108.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.808898926 CET50052445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:11.808933020 CET50053445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:11.808975935 CET50053445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:11.809086084 CET50054445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:11.813832998 CET445500539.32.108.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.814006090 CET445500548.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:11.814203978 CET50054445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:11.814228058 CET50054445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:11.819010973 CET445500548.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:12.836009979 CET4454998640.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:12.836146116 CET49986445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:58:12.837529898 CET49986445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:58:12.837583065 CET49986445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:58:12.842412949 CET4454998640.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:12.842446089 CET4454998640.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.107979059 CET50055445192.168.2.851.20.135.12
                                                                                                                    Jan 15, 2025 16:58:13.113078117 CET4455005551.20.135.12192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.113157034 CET50055445192.168.2.851.20.135.12
                                                                                                                    Jan 15, 2025 16:58:13.113290071 CET50055445192.168.2.851.20.135.12
                                                                                                                    Jan 15, 2025 16:58:13.113409042 CET50056445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:13.118285894 CET4455005651.20.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.118319035 CET4455005551.20.135.12192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.118345022 CET50056445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:13.118391037 CET50055445192.168.2.851.20.135.12
                                                                                                                    Jan 15, 2025 16:58:13.118484020 CET50056445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:13.118729115 CET50057445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:13.123349905 CET4455005651.20.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.123410940 CET50056445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:13.123644114 CET4455005751.20.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.123711109 CET50057445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:13.123754025 CET50057445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:13.128539085 CET4455005751.20.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.808146000 CET50058445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:13.813818932 CET4455005846.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:13.813939095 CET50058445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:13.813970089 CET50058445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:13.819238901 CET4455005846.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.355353117 CET50059445192.168.2.82.226.240.139
                                                                                                                    Jan 15, 2025 16:58:14.363471031 CET445500592.226.240.139192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.363656044 CET50059445192.168.2.82.226.240.139
                                                                                                                    Jan 15, 2025 16:58:14.363738060 CET50059445192.168.2.82.226.240.139
                                                                                                                    Jan 15, 2025 16:58:14.363879919 CET50060445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:14.368741989 CET445500592.226.240.139192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.368761063 CET445500602.226.240.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.368798018 CET50059445192.168.2.82.226.240.139
                                                                                                                    Jan 15, 2025 16:58:14.368840933 CET50060445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:14.368892908 CET50060445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:14.369117975 CET50061445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:14.373852015 CET445500602.226.240.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.373909950 CET50060445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:14.374025106 CET445500612.226.240.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.374085903 CET50061445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:14.374125004 CET50061445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:14.378952980 CET445500612.226.240.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.850737095 CET445500119.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.850817919 CET50011445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:58:14.850920916 CET50011445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:58:14.850920916 CET50011445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:58:14.855854988 CET445500119.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:14.855886936 CET445500119.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.099777937 CET44550015203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.099894047 CET50015445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:58:15.099982023 CET50015445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:58:15.099982977 CET50015445192.168.2.8203.228.45.1
                                                                                                                    Jan 15, 2025 16:58:15.104859114 CET44550015203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.104871988 CET44550015203.228.45.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.152050972 CET50062445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:15.156879902 CET44550062203.228.45.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.156954050 CET50062445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:15.157006025 CET50062445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:15.157377005 CET50063445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:15.161864042 CET44550062203.228.45.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.161911011 CET50062445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:15.162168980 CET44550063203.228.45.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.162564993 CET50063445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:15.162564993 CET50063445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:15.167304039 CET44550063203.228.45.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.511724949 CET50064445192.168.2.890.136.226.143
                                                                                                                    Jan 15, 2025 16:58:15.517082930 CET4455006490.136.226.143192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.517226934 CET50064445192.168.2.890.136.226.143
                                                                                                                    Jan 15, 2025 16:58:15.517302036 CET50064445192.168.2.890.136.226.143
                                                                                                                    Jan 15, 2025 16:58:15.517366886 CET50065445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:15.522747040 CET4455006590.136.226.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.522841930 CET50065445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:15.522841930 CET50065445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:15.522886992 CET4455006490.136.226.143192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.522937059 CET50064445192.168.2.890.136.226.143
                                                                                                                    Jan 15, 2025 16:58:15.523108959 CET50066445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:15.528150082 CET4455006590.136.226.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.528166056 CET4455006690.136.226.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.528203964 CET50065445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:15.528238058 CET50066445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:15.528275967 CET50066445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:15.533046961 CET4455006690.136.226.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.839405060 CET50067445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:58:15.844520092 CET4455006740.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:15.844626904 CET50067445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:58:15.844655991 CET50067445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:58:15.849508047 CET4455006740.249.82.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.589668036 CET50068445192.168.2.841.232.2.97
                                                                                                                    Jan 15, 2025 16:58:16.594598055 CET4455006841.232.2.97192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.594680071 CET50068445192.168.2.841.232.2.97
                                                                                                                    Jan 15, 2025 16:58:16.594744921 CET50068445192.168.2.841.232.2.97
                                                                                                                    Jan 15, 2025 16:58:16.594861031 CET50069445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:16.599596977 CET4455006841.232.2.97192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.599675894 CET4455006941.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.599714041 CET50069445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:16.599766970 CET4455006841.232.2.97192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.599781990 CET50069445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:16.599814892 CET50068445192.168.2.841.232.2.97
                                                                                                                    Jan 15, 2025 16:58:16.600056887 CET50070445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:16.604607105 CET4455006941.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.604645967 CET50069445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:16.604854107 CET4455007041.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.604903936 CET50070445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:16.604929924 CET50070445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:16.609657049 CET4455007041.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.864969969 CET4455001838.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.865164042 CET50018445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:58:16.865164042 CET50018445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:58:16.865164042 CET50018445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:58:16.870034933 CET4455001838.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:16.870080948 CET4455001838.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.023458958 CET44550019209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.023530960 CET50019445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:58:17.023578882 CET50019445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:58:17.023643017 CET50019445192.168.2.8209.135.205.1
                                                                                                                    Jan 15, 2025 16:58:17.028316021 CET44550019209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.028352022 CET44550019209.135.205.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.028708935 CET5007180192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.033529997 CET805007188.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.033596992 CET5007180192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.033660889 CET5007180192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.038451910 CET805007188.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.038501024 CET5007180192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.043246031 CET805007188.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.090445042 CET5007380192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.090487003 CET50072445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:17.097965002 CET805007388.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.097982883 CET44550072209.135.205.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.098067999 CET5007380192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.098078012 CET50072445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:17.098099947 CET5007380192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.099140882 CET50072445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:17.099515915 CET50074445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:17.103209019 CET805007388.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.103259087 CET5007380192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:17.103935003 CET44550072209.135.205.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.103987932 CET50072445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:17.104280949 CET44550074209.135.205.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.104341984 CET50074445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:17.104388952 CET50074445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:17.108179092 CET805007388.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.109198093 CET44550074209.135.205.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.605545044 CET50075445192.168.2.8118.158.103.244
                                                                                                                    Jan 15, 2025 16:58:17.610536098 CET44550075118.158.103.244192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.610625982 CET50075445192.168.2.8118.158.103.244
                                                                                                                    Jan 15, 2025 16:58:17.610687971 CET50075445192.168.2.8118.158.103.244
                                                                                                                    Jan 15, 2025 16:58:17.610821962 CET50076445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:17.615617990 CET44550075118.158.103.244192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.615672112 CET44550075118.158.103.244192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.615703106 CET44550076118.158.103.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.615721941 CET50075445192.168.2.8118.158.103.244
                                                                                                                    Jan 15, 2025 16:58:17.615767002 CET50076445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:17.615829945 CET50076445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:17.616194010 CET50077445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:17.620918989 CET44550076118.158.103.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.620978117 CET50076445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:17.621079922 CET44550077118.158.103.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.621144056 CET50077445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:17.623297930 CET50077445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:17.628258944 CET44550077118.158.103.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.855165958 CET50078445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:58:17.860300064 CET445500789.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.860393047 CET50078445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:58:17.860408068 CET50078445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:58:17.865231991 CET445500789.166.247.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.395919085 CET4455007041.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.396187067 CET50070445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:18.396187067 CET50070445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:18.399010897 CET50070445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:18.401073933 CET4455007041.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.403731108 CET4455007041.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.595191956 CET50079445192.168.2.847.60.61.144
                                                                                                                    Jan 15, 2025 16:58:18.600069046 CET4455007947.60.61.144192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.600168943 CET50079445192.168.2.847.60.61.144
                                                                                                                    Jan 15, 2025 16:58:18.600260973 CET50079445192.168.2.847.60.61.144
                                                                                                                    Jan 15, 2025 16:58:18.600429058 CET50080445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:18.605122089 CET4455007947.60.61.144192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.605182886 CET50079445192.168.2.847.60.61.144
                                                                                                                    Jan 15, 2025 16:58:18.605200052 CET4455008047.60.61.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.605251074 CET50080445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:18.605326891 CET50080445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:18.605640888 CET50081445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:18.610140085 CET4455008047.60.61.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.610208035 CET50080445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:18.610445976 CET4455008147.60.61.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.610503912 CET50081445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:18.610548019 CET50081445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:18.615299940 CET4455008147.60.61.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.898607016 CET44550022158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.898693085 CET50022445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:58:18.899415970 CET50022445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:58:18.899457932 CET50022445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:58:18.904268026 CET44550022158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:18.904283047 CET44550022158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.068680048 CET44550023198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.068757057 CET50023445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:58:19.068857908 CET50023445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:58:19.068887949 CET50023445192.168.2.8198.232.135.1
                                                                                                                    Jan 15, 2025 16:58:19.073648930 CET44550023198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.073817015 CET44550023198.232.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.122163057 CET50082445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:19.127125025 CET44550082198.232.135.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.127192020 CET50082445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:19.127304077 CET50082445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:19.128185034 CET50083445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:19.132683039 CET44550082198.232.135.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.132740974 CET50082445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:19.133069038 CET44550083198.232.135.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.133116961 CET50083445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:19.133295059 CET50083445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:19.138155937 CET44550083198.232.135.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.483583927 CET50084445192.168.2.8122.230.196.134
                                                                                                                    Jan 15, 2025 16:58:19.488500118 CET44550084122.230.196.134192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.488636971 CET50084445192.168.2.8122.230.196.134
                                                                                                                    Jan 15, 2025 16:58:19.495795012 CET50084445192.168.2.8122.230.196.134
                                                                                                                    Jan 15, 2025 16:58:19.496032953 CET50085445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:19.500664949 CET44550084122.230.196.134192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.500741959 CET50084445192.168.2.8122.230.196.134
                                                                                                                    Jan 15, 2025 16:58:19.500911951 CET44550085122.230.196.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.500982046 CET50085445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:19.508527040 CET50085445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:19.509102106 CET50086445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:19.513382912 CET44550085122.230.196.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.513448000 CET50085445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:19.513966084 CET44550086122.230.196.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.514046907 CET50086445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:19.514091015 CET50086445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:19.518837929 CET44550086122.230.196.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.870742083 CET50087445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:58:19.875606060 CET4455008738.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:19.875715017 CET50087445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:58:19.875760078 CET50087445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:58:19.880531073 CET4455008738.185.147.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.308461905 CET50088445192.168.2.8130.148.27.119
                                                                                                                    Jan 15, 2025 16:58:20.313368082 CET44550088130.148.27.119192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.313469887 CET50088445192.168.2.8130.148.27.119
                                                                                                                    Jan 15, 2025 16:58:20.313534975 CET50088445192.168.2.8130.148.27.119
                                                                                                                    Jan 15, 2025 16:58:20.313637018 CET50089445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:20.318358898 CET44550089130.148.27.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.318412066 CET50089445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:20.318418026 CET44550088130.148.27.119192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.318474054 CET50088445192.168.2.8130.148.27.119
                                                                                                                    Jan 15, 2025 16:58:20.318519115 CET50089445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:20.318747044 CET50090445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:20.323355913 CET44550089130.148.27.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.323431969 CET50089445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:20.323573112 CET44550090130.148.27.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.323613882 CET50090445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:20.323637962 CET50090445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:20.328358889 CET44550090130.148.27.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.896831036 CET44550026176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.896914005 CET50026445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:58:20.896962881 CET50026445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:58:20.897001028 CET50026445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:58:20.901834011 CET44550026176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:20.901848078 CET44550026176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.074153900 CET50091445192.168.2.8209.207.4.46
                                                                                                                    Jan 15, 2025 16:58:21.079000950 CET44550091209.207.4.46192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.079076052 CET50091445192.168.2.8209.207.4.46
                                                                                                                    Jan 15, 2025 16:58:21.079158068 CET50091445192.168.2.8209.207.4.46
                                                                                                                    Jan 15, 2025 16:58:21.079339027 CET50092445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:21.084011078 CET44550091209.207.4.46192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.084064960 CET50091445192.168.2.8209.207.4.46
                                                                                                                    Jan 15, 2025 16:58:21.084153891 CET44550092209.207.4.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.084213972 CET50092445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:21.084259033 CET50092445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:21.084495068 CET50093445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:21.089296103 CET44550092209.207.4.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.089306116 CET44550093209.207.4.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.089358091 CET50092445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:21.089380026 CET50093445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:21.092257023 CET50093445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:21.097059965 CET44550093209.207.4.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.152654886 CET44550027112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.152726889 CET50027445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:58:21.152821064 CET50027445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:58:21.152895927 CET50027445192.168.2.8112.84.177.1
                                                                                                                    Jan 15, 2025 16:58:21.157741070 CET44550027112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.157754898 CET44550027112.84.177.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.214781046 CET50094445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:21.219762087 CET44550094112.84.177.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.219868898 CET50094445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:21.219937086 CET50094445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:21.220835924 CET50095445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:21.224814892 CET44550094112.84.177.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.224883080 CET50094445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:21.225682020 CET44550095112.84.177.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.225740910 CET50095445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:21.225779057 CET50095445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:21.230509996 CET44550095112.84.177.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.408540010 CET50096445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:21.414057016 CET4455009641.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.414125919 CET50096445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:21.417339087 CET50096445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:21.423032045 CET4455009641.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.902056932 CET50098445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:58:21.907062054 CET44550098158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:21.907140970 CET50098445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:58:21.907212019 CET50098445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:58:21.912045956 CET44550098158.94.246.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:22.932037115 CET4455003032.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:22.932152987 CET50030445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:22.932198048 CET50030445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:22.932229996 CET50030445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:22.936999083 CET4455003032.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:22.937009096 CET4455003032.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.136702061 CET44550031201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.136770964 CET50031445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:58:23.136862993 CET50031445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:58:23.136938095 CET50031445192.168.2.8201.202.46.1
                                                                                                                    Jan 15, 2025 16:58:23.141634941 CET44550031201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.141696930 CET44550031201.202.46.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.199134111 CET50102445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:23.204184055 CET44550102201.202.46.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.205044031 CET50102445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:23.205141068 CET50102445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:23.205188990 CET4455009641.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.205507040 CET50103445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:23.205550909 CET50096445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:23.205600023 CET50096445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:23.205629110 CET50096445192.168.2.841.232.2.1
                                                                                                                    Jan 15, 2025 16:58:23.209974051 CET44550102201.202.46.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.210377932 CET44550103201.202.46.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.210387945 CET4455009641.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.210403919 CET4455009641.232.2.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.210433006 CET50102445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:23.210467100 CET50103445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:23.210537910 CET50103445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:23.215259075 CET44550103201.202.46.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.261420965 CET50104445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:23.266303062 CET4455010441.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.268946886 CET50104445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:23.269053936 CET50104445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:23.269373894 CET50105445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:23.274005890 CET4455010441.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.274233103 CET4455010541.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.274290085 CET50104445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:23.274308920 CET50105445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:23.274358988 CET50105445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:23.279115915 CET4455010541.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.902095079 CET50108445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:58:23.907041073 CET44550108176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:23.907111883 CET50108445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:58:23.907186031 CET50108445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:58:23.911907911 CET44550108176.122.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:24.943356991 CET4455003488.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:24.943454027 CET50034445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:24.943551064 CET50034445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:24.943551064 CET50034445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:24.948554993 CET4455003488.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:24.948566914 CET4455003488.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.146887064 CET4455003569.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.146987915 CET50035445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:25.148122072 CET4455010541.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.148192883 CET50105445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:25.149164915 CET50035445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:25.149230957 CET50035445192.168.2.869.111.126.1
                                                                                                                    Jan 15, 2025 16:58:25.149847984 CET50105445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:25.149888039 CET50105445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:25.154045105 CET4455003569.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.154057026 CET4455003569.111.126.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.154684067 CET4455010541.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.154710054 CET4455010541.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.215260983 CET50116445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:25.220197916 CET4455011669.111.126.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.220290899 CET50116445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:25.221213102 CET50116445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:25.221553087 CET50117445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:25.226352930 CET4455011769.111.126.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.226413965 CET50117445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:25.226450920 CET50117445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:25.227580070 CET4455011669.111.126.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.233882904 CET4455011769.111.126.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.259633064 CET4455011669.111.126.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.259752989 CET50116445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:25.933413029 CET50126445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:25.938873053 CET4455012632.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.938971996 CET50126445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:25.939023018 CET50126445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:25.945190907 CET4455012632.252.86.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.176517010 CET50128443192.168.2.892.113.16.129
                                                                                                                    Jan 15, 2025 16:58:26.176582098 CET4435012892.113.16.129192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.176666975 CET50128443192.168.2.892.113.16.129
                                                                                                                    Jan 15, 2025 16:58:26.803204060 CET4455003857.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.803287029 CET50038445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:26.803467989 CET50038445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:26.803520918 CET50038445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:26.808351994 CET4455003857.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.808366060 CET4455003857.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.215616941 CET44550039200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.215818882 CET50039445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:27.215864897 CET50039445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:27.215900898 CET50039445192.168.2.8200.214.167.1
                                                                                                                    Jan 15, 2025 16:58:27.220679998 CET44550039200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.220733881 CET44550039200.214.167.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.277043104 CET50151445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:27.282032013 CET44550151200.214.167.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.282160044 CET50151445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:27.282250881 CET50151445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:27.282567024 CET50152445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:27.287131071 CET44550151200.214.167.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.287197113 CET50151445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:27.287367105 CET44550152200.214.167.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.287425995 CET50152445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:27.287456989 CET50152445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:27.292280912 CET44550152200.214.167.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.948859930 CET50163445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:27.953773975 CET4455016388.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.953846931 CET50163445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:27.953926086 CET50163445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:27.958861113 CET4455016388.63.225.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:28.151925087 CET50173445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:28.158458948 CET4455017341.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:28.158536911 CET50173445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:28.158595085 CET50173445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:28.164603949 CET4455017341.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:28.600157022 CET44550042153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:28.600431919 CET50042445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:28.600431919 CET50042445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:28.600431919 CET50042445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:28.605405092 CET44550042153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:28.605451107 CET44550042153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:28.925923109 CET50193443192.168.2.8104.18.243.107
                                                                                                                    Jan 15, 2025 16:58:28.925973892 CET44350193104.18.243.107192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:28.926039934 CET50193443192.168.2.8104.18.243.107
                                                                                                                    Jan 15, 2025 16:58:29.178325891 CET4455004384.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.180951118 CET50043445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:29.181003094 CET50043445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:29.181044102 CET50043445192.168.2.884.147.160.1
                                                                                                                    Jan 15, 2025 16:58:29.185899019 CET4455004384.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.185915947 CET4455004384.147.160.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.249445915 CET50200445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:29.254317045 CET4455020084.147.160.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.254391909 CET50200445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:29.254486084 CET50200445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:29.254831076 CET50201445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:29.260656118 CET4455020084.147.160.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.260703087 CET4455020184.147.160.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.260773897 CET50200445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:29.260809898 CET50201445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:29.261179924 CET50201445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:29.266521931 CET4455020184.147.160.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.811631918 CET50220445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:29.816606998 CET4455022057.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:29.816665888 CET50220445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:29.816701889 CET50220445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:29.821516991 CET4455022057.162.85.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.040874004 CET4455017341.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.044152021 CET50173445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:30.073898077 CET50173445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:30.074101925 CET50173445192.168.2.841.232.2.2
                                                                                                                    Jan 15, 2025 16:58:30.078933001 CET4455017341.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.078957081 CET4455017341.232.2.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.136976004 CET50227445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:30.141876936 CET4455022741.232.2.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.143521070 CET50227445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:30.143601894 CET50227445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:30.143918037 CET50228445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:30.148608923 CET4455022741.232.2.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.148665905 CET4455022841.232.2.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.148667097 CET50227445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:30.148729086 CET50228445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:30.148772955 CET50228445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:30.153510094 CET4455022841.232.2.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.228981972 CET4455004628.183.62.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.232980013 CET50046445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:30.270663977 CET50046445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:30.270821095 CET50046445192.168.2.828.183.62.1
                                                                                                                    Jan 15, 2025 16:58:30.275646925 CET4455004628.183.62.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:30.275669098 CET4455004628.183.62.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.240786076 CET4455004775.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.240914106 CET50047445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:31.242130995 CET50047445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:31.242130995 CET50047445192.168.2.875.165.172.1
                                                                                                                    Jan 15, 2025 16:58:31.246953964 CET4455004775.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.246973038 CET4455004775.165.172.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.308299065 CET50273445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:31.313349009 CET4455027375.165.172.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.313437939 CET50273445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:31.313529015 CET50273445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:31.313874960 CET50274445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:31.318412066 CET4455027375.165.172.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.318475962 CET50273445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:31.318701029 CET4455027475.165.172.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.318763971 CET50274445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:31.318798065 CET50274445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:31.323631048 CET4455027475.165.172.2192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.605113029 CET50290445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:31.610078096 CET44550290153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.610188961 CET50290445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:31.610224962 CET50290445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:31.615070105 CET44550290153.101.17.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.729383945 CET4455005091.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.729517937 CET50050445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:31.729613066 CET50050445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:31.729635000 CET50050445192.168.2.891.57.194.1
                                                                                                                    Jan 15, 2025 16:58:31.734582901 CET4455005091.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.734627008 CET4455005091.57.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.964472055 CET4455022841.232.2.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.964680910 CET50228445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:31.964680910 CET50228445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:31.964680910 CET50228445192.168.2.841.232.2.3
                                                                                                                    Jan 15, 2025 16:58:31.969530106 CET4455022841.232.2.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:31.969551086 CET4455022841.232.2.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:33.178256035 CET445500539.32.108.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:33.178344965 CET50053445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:33.181824923 CET50053445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:33.181855917 CET50053445192.168.2.89.32.108.1
                                                                                                                    Jan 15, 2025 16:58:33.186654091 CET445500539.32.108.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:33.186677933 CET445500539.32.108.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:33.215487003 CET445500548.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:33.215538979 CET50054445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:33.217309952 CET50054445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:33.217339039 CET50054445192.168.2.88.188.251.1
                                                                                                                    Jan 15, 2025 16:58:33.222162008 CET445500548.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:33.222182989 CET445500548.188.251.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:34.477097034 CET4455005751.20.135.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:34.477157116 CET50057445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:35.182041883 CET4455005846.252.194.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:35.182624102 CET50058445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:35.723346949 CET50063445192.168.2.8203.228.45.2
                                                                                                                    Jan 15, 2025 16:58:35.723428011 CET50274445192.168.2.875.165.172.2
                                                                                                                    Jan 15, 2025 16:58:35.723459959 CET50095445192.168.2.8112.84.177.2
                                                                                                                    Jan 15, 2025 16:58:35.723505974 CET50083445192.168.2.8198.232.135.2
                                                                                                                    Jan 15, 2025 16:58:35.723527908 CET50074445192.168.2.8209.135.205.2
                                                                                                                    Jan 15, 2025 16:58:35.723546982 CET50103445192.168.2.8201.202.46.2
                                                                                                                    Jan 15, 2025 16:58:35.723588943 CET50152445192.168.2.8200.214.167.2
                                                                                                                    Jan 15, 2025 16:58:35.723596096 CET50117445192.168.2.869.111.126.2
                                                                                                                    Jan 15, 2025 16:58:35.723732948 CET50057445192.168.2.851.20.135.1
                                                                                                                    Jan 15, 2025 16:58:35.723764896 CET50058445192.168.2.846.252.194.1
                                                                                                                    Jan 15, 2025 16:58:35.723790884 CET50061445192.168.2.82.226.240.1
                                                                                                                    Jan 15, 2025 16:58:35.723807096 CET50066445192.168.2.890.136.226.1
                                                                                                                    Jan 15, 2025 16:58:35.723828077 CET50067445192.168.2.840.249.82.1
                                                                                                                    Jan 15, 2025 16:58:35.723856926 CET50077445192.168.2.8118.158.103.1
                                                                                                                    Jan 15, 2025 16:58:35.723875046 CET50078445192.168.2.89.166.247.1
                                                                                                                    Jan 15, 2025 16:58:35.723896980 CET50081445192.168.2.847.60.61.1
                                                                                                                    Jan 15, 2025 16:58:35.723943949 CET50087445192.168.2.838.185.147.1
                                                                                                                    Jan 15, 2025 16:58:35.723947048 CET50086445192.168.2.8122.230.196.1
                                                                                                                    Jan 15, 2025 16:58:35.723979950 CET50090445192.168.2.8130.148.27.1
                                                                                                                    Jan 15, 2025 16:58:35.723993063 CET50093445192.168.2.8209.207.4.1
                                                                                                                    Jan 15, 2025 16:58:35.724014997 CET50108445192.168.2.8176.122.86.1
                                                                                                                    Jan 15, 2025 16:58:35.724042892 CET50098445192.168.2.8158.94.246.1
                                                                                                                    Jan 15, 2025 16:58:35.724073887 CET50126445192.168.2.832.252.86.1
                                                                                                                    Jan 15, 2025 16:58:35.724107027 CET50163445192.168.2.888.63.225.1
                                                                                                                    Jan 15, 2025 16:58:35.724175930 CET50201445192.168.2.884.147.160.2
                                                                                                                    Jan 15, 2025 16:58:35.724211931 CET50220445192.168.2.857.162.85.1
                                                                                                                    Jan 15, 2025 16:58:35.724235058 CET50290445192.168.2.8153.101.17.1
                                                                                                                    Jan 15, 2025 16:58:38.397264004 CET805007188.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:38.397543907 CET5007180192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:38.397543907 CET5007180192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:38.402460098 CET805007188.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:38.477019072 CET805007388.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:38.477098942 CET5007380192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:38.477143049 CET5007380192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:58:38.481986046 CET805007388.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:46.183175087 CET50128443192.168.2.892.113.16.129
                                                                                                                    Jan 15, 2025 16:58:46.183357000 CET4435012892.113.16.129192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:46.183434963 CET50128443192.168.2.892.113.16.129
                                                                                                                    Jan 15, 2025 16:58:46.198126078 CET50492443192.168.2.876.76.21.21
                                                                                                                    Jan 15, 2025 16:58:46.198215008 CET4435049276.76.21.21192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:46.198318958 CET50492443192.168.2.876.76.21.21
                                                                                                                    Jan 15, 2025 16:58:48.933018923 CET50193443192.168.2.8104.18.243.107
                                                                                                                    Jan 15, 2025 16:58:48.933135033 CET44350193104.18.243.107192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:48.933213949 CET50193443192.168.2.8104.18.243.107
                                                                                                                    Jan 15, 2025 16:58:50.122950077 CET6179253192.168.2.81.1.1.1
                                                                                                                    Jan 15, 2025 16:58:50.127849102 CET53617921.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.127954960 CET6179253192.168.2.81.1.1.1
                                                                                                                    Jan 15, 2025 16:58:50.132953882 CET53617921.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.638041019 CET53617921.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.642935991 CET6179253192.168.2.81.1.1.1
                                                                                                                    Jan 15, 2025 16:58:50.648073912 CET53617921.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.648145914 CET6179253192.168.2.81.1.1.1
                                                                                                                    Jan 15, 2025 16:58:52.084444046 CET61806443192.168.2.8188.114.96.3
                                                                                                                    Jan 15, 2025 16:58:52.084475994 CET44361806188.114.96.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:52.084548950 CET61806443192.168.2.8188.114.96.3
                                                                                                                    Jan 15, 2025 16:59:06.198775053 CET50492443192.168.2.876.76.21.21
                                                                                                                    Jan 15, 2025 16:59:06.198848009 CET4435049276.76.21.21192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.198999882 CET50492443192.168.2.876.76.21.21
                                                                                                                    Jan 15, 2025 16:59:08.421050072 CET6189880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.426501989 CET806189888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.426585913 CET6189880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.426640987 CET6189880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.432734966 CET806189888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.432790041 CET6189880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.437580109 CET806189888.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.480412006 CET6190080192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.485266924 CET806190088.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.485346079 CET6190080192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.485380888 CET6190080192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.490142107 CET806190088.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.490201950 CET6190080192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:08.494993925 CET806190088.198.69.43192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:09.292828083 CET61906443192.168.2.8198.49.23.145
                                                                                                                    Jan 15, 2025 16:59:09.292864084 CET44361906198.49.23.145192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:09.292917967 CET61906443192.168.2.8198.49.23.145
                                                                                                                    Jan 15, 2025 16:59:12.089232922 CET61806443192.168.2.8188.114.96.3
                                                                                                                    Jan 15, 2025 16:59:12.089308023 CET44361806188.114.96.3192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:12.089361906 CET61806443192.168.2.8188.114.96.3
                                                                                                                    Jan 15, 2025 16:59:25.624663115 CET6189880192.168.2.888.198.69.43
                                                                                                                    Jan 15, 2025 16:59:25.624721050 CET61906443192.168.2.8198.49.23.145
                                                                                                                    Jan 15, 2025 16:59:25.625226021 CET6190080192.168.2.888.198.69.43
                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Jan 15, 2025 16:57:15.577267885 CET6376153192.168.2.81.1.1.1
                                                                                                                    Jan 15, 2025 16:57:15.586266041 CET53637611.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:25.564984083 CET53643201.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:25.575037003 CET53590851.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:28.691143990 CET6418253192.168.2.81.1.1.1
                                                                                                                    Jan 15, 2025 16:57:28.700861931 CET53641821.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:57:51.705912113 CET138138192.168.2.8192.168.2.255
                                                                                                                    Jan 15, 2025 16:58:17.019062996 CET53617241.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:17.028170109 CET53577461.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.678067923 CET53532921.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.689394951 CET53511281.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.699764013 CET53617811.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.717859983 CET53588961.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.740156889 CET53503431.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.751283884 CET53648451.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.761869907 CET53570581.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.772902966 CET53607291.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.784063101 CET53546711.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.795430899 CET53559611.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.808588982 CET53551851.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.868117094 CET53655261.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.883945942 CET53564441.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.894757032 CET53580191.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:25.970805883 CET53566601.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.053287983 CET53575061.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.129336119 CET53506561.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.226914883 CET53597771.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.237474918 CET53563281.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.411426067 CET53584281.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.587388992 CET53602991.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.748153925 CET53564101.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.759663105 CET53647481.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:26.928416967 CET53589221.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.089598894 CET53549881.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.099725962 CET53498951.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.110449076 CET53568951.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.126667023 CET53562201.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.137155056 CET53639491.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.148541927 CET53505331.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.159881115 CET53564031.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.170531034 CET53494071.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.180171013 CET53620011.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.191492081 CET53503541.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.361083984 CET53542051.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.519859076 CET53495801.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.531750917 CET53529081.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.541338921 CET53609411.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.552525043 CET53582291.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.720545053 CET53529301.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.731307983 CET53596751.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.742270947 CET53500781.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.751441956 CET53519841.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.760987043 CET53635381.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.771727085 CET53521641.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.783482075 CET53614841.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.949646950 CET53518241.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.960237980 CET53610971.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:27.970500946 CET53548941.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:48.943461895 CET53561181.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:48.953186989 CET53611451.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:48.963905096 CET53571391.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.129981041 CET53583621.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.142441034 CET53625861.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.304966927 CET53573541.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.315110922 CET53570761.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.326586962 CET53560121.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.336996078 CET53532061.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.498584032 CET53558001.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.509875059 CET53526541.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.520354986 CET53549351.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.699244022 CET53596081.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.705637932 CET53596081.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.861979961 CET53540881.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.873217106 CET53643261.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.885520935 CET53578271.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:49.896423101 CET53594631.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.060941935 CET53641191.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.071346998 CET53629171.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.082734108 CET53579251.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.093359947 CET53574911.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.104197979 CET53567991.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.114897013 CET53627101.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.122451067 CET53530131.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.800045013 CET53580251.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.810967922 CET53520201.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.821660042 CET53649071.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.831649065 CET53533091.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.841964960 CET53634131.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:50.852941036 CET53561581.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.014122963 CET53569251.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.024272919 CET53587901.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.034744024 CET53592341.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.194996119 CET53621291.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.369190931 CET53594351.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.381172895 CET53552501.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.393301010 CET53623051.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.551785946 CET53629501.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.562875986 CET53604211.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.574031115 CET53546491.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.585158110 CET53500111.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.594937086 CET53579401.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.605928898 CET53633481.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.623728991 CET53537221.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.633764029 CET53652711.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.649527073 CET53625201.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.661390066 CET53570371.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.823533058 CET53551641.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.834578037 CET53565451.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:51.845736027 CET53617181.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:52.012582064 CET53635401.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:52.023865938 CET53576341.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:52.034324884 CET53589941.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:58:52.045413971 CET53565741.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.208797932 CET53653191.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.224262953 CET53567221.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.237534046 CET53615971.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.249871969 CET53580391.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.260696888 CET53527771.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.271836042 CET53649901.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.282334089 CET53614161.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.441374063 CET53624821.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.606719017 CET53549311.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.617566109 CET53553521.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.629246950 CET53510551.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.639729023 CET53606151.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.812975883 CET53627741.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.825613022 CET53500801.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.836265087 CET53576221.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:06.846323967 CET53585491.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.010788918 CET53595261.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.022918940 CET53586561.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.033428907 CET53544271.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.044606924 CET53504571.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.059453011 CET53534231.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.218390942 CET53506421.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.381973028 CET53596211.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.392991066 CET53600121.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.402645111 CET53580331.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.413516045 CET53502521.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.575265884 CET53554601.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.732688904 CET53553371.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.745672941 CET53603331.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.759087086 CET53594321.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.770684004 CET53540061.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.782800913 CET53571361.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.940789938 CET53580391.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.951905966 CET53582301.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:07.962873936 CET53604961.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.122174025 CET53579121.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.281109095 CET53610161.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.411401033 CET53634091.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.420593023 CET53536321.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.446822882 CET53630001.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.457202911 CET53567841.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.467772961 CET53634131.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.478197098 CET53641141.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.488238096 CET53548871.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.498240948 CET53644901.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.507699013 CET53533241.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.519346952 CET53548651.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.530193090 CET53526611.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.541234970 CET53612541.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.551254034 CET53606381.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.561302900 CET53632171.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.570728064 CET53508311.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.581228018 CET53619111.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.741024971 CET53560871.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.909763098 CET53571031.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.919416904 CET53551481.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:08.931802034 CET53536451.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:09.094412088 CET53513111.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:09.110802889 CET53568841.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:12.099358082 CET53537021.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:12.110275984 CET53623031.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:12.120338917 CET53623131.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:12.276958942 CET53610311.1.1.1192.168.2.8
                                                                                                                    Jan 15, 2025 16:59:12.287694931 CET53562441.1.1.1192.168.2.8
                                                                                                                    TimestampSource IPDest IPChecksumCodeType
                                                                                                                    Jan 15, 2025 16:58:49.705734968 CET192.168.2.81.1.1.1c222(Port unreachable)Destination Unreachable
                                                                                                                    Jan 15, 2025 16:59:09.300976038 CET192.168.2.81.1.1.1c1f4(Port unreachable)Destination Unreachable
                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                    Jan 15, 2025 16:57:15.577267885 CET192.168.2.81.1.1.10xcb16Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:57:28.691143990 CET192.168.2.81.1.1.10x1c56Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                    Jan 15, 2025 16:57:15.586266041 CET1.1.1.1192.168.2.80xcb16No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:57:15.586266041 CET1.1.1.1192.168.2.80xcb16No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:57:25.564984083 CET1.1.1.1192.168.2.80xdd7cServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:57:25.575037003 CET1.1.1.1192.168.2.80xf647Server failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:57:28.700861931 CET1.1.1.1192.168.2.80x1c56No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:57:28.700861931 CET1.1.1.1192.168.2.80x1c56No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:17.019062996 CET1.1.1.1192.168.2.80x537fServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:17.028170109 CET1.1.1.1192.168.2.80xafdaServer failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.678067923 CET1.1.1.1192.168.2.80x5ea7Name error (3)hiuznf.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.689394951 CET1.1.1.1192.168.2.80xd882Name error (3)qycyhq.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.699764013 CET1.1.1.1192.168.2.80x1d98Name error (3)oljrbm.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.717859983 CET1.1.1.1192.168.2.80xff1aName error (3)uzgscj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.740156889 CET1.1.1.1192.168.2.80x47f5Name error (3)izacru.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.751283884 CET1.1.1.1192.168.2.80x5692Name error (3)mhmasr.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.761869907 CET1.1.1.1192.168.2.80xd3c2Name error (3)fofavv.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.772902966 CET1.1.1.1192.168.2.80x7bdaName error (3)vdxosv.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.784063101 CET1.1.1.1192.168.2.80x1cadName error (3)xdkgwd.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.795430899 CET1.1.1.1192.168.2.80xa792Name error (3)aguuxw.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.808588982 CET1.1.1.1192.168.2.80xf499Name error (3)bnnjpj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.868117094 CET1.1.1.1192.168.2.80xb59Name error (3)vssqzu.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.883945942 CET1.1.1.1192.168.2.80xba3aName error (3)aqziks.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.894757032 CET1.1.1.1192.168.2.80x8864Name error (3)eoauui.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:25.970805883 CET1.1.1.1192.168.2.80x275aName error (3)fjlfoj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.053287983 CET1.1.1.1192.168.2.80x199eName error (3)imjmns.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.129336119 CET1.1.1.1192.168.2.80x7bfbName error (3)sgucuw.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.226914883 CET1.1.1.1192.168.2.80x69f5Name error (3)bzmigs.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.237474918 CET1.1.1.1192.168.2.80xcf78Name error (3)efegei.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.411426067 CET1.1.1.1192.168.2.80xad49Name error (3)xwowqk.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.587388992 CET1.1.1.1192.168.2.80x57bfName error (3)whmeca.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.748153925 CET1.1.1.1192.168.2.80xaca1Name error (3)yjumyc.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.759663105 CET1.1.1.1192.168.2.80xc9bName error (3)eicsxp.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:26.928416967 CET1.1.1.1192.168.2.80x2c6fName error (3)ybcflo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.089598894 CET1.1.1.1192.168.2.80xc380Name error (3)qfqayo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.099725962 CET1.1.1.1192.168.2.80x71b7Name error (3)tnwywt.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.110449076 CET1.1.1.1192.168.2.80x749Name error (3)onzpwq.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.126667023 CET1.1.1.1192.168.2.80x49a4Name error (3)mpblhc.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.137155056 CET1.1.1.1192.168.2.80xa7f1Name error (3)akkujf.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.148541927 CET1.1.1.1192.168.2.80x6689Name error (3)vixeeq.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.159881115 CET1.1.1.1192.168.2.80x1602Name error (3)vgkebm.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.170531034 CET1.1.1.1192.168.2.80x9d05Name error (3)mmazow.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.180171013 CET1.1.1.1192.168.2.80x5c87Name error (3)rfiiyy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.191492081 CET1.1.1.1192.168.2.80x1b05Name error (3)xmkske.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.361083984 CET1.1.1.1192.168.2.80x9b30Name error (3)uxumpp.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.519859076 CET1.1.1.1192.168.2.80xaaa2Name error (3)uncjvy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.531750917 CET1.1.1.1192.168.2.80xcb2dName error (3)ikebhe.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.541338921 CET1.1.1.1192.168.2.80x96acName error (3)hrospx.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.552525043 CET1.1.1.1192.168.2.80xb54aName error (3)wbqpcg.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.720545053 CET1.1.1.1192.168.2.80x2a8bName error (3)lnsrfu.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.731307983 CET1.1.1.1192.168.2.80x36a9Name error (3)izgyem.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.742270947 CET1.1.1.1192.168.2.80x1acName error (3)nitrjr.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.751441956 CET1.1.1.1192.168.2.80x911Name error (3)mgknby.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.760987043 CET1.1.1.1192.168.2.80x8ec4Name error (3)tiggay.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.771727085 CET1.1.1.1192.168.2.80x4a9bName error (3)dwyvvs.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.783482075 CET1.1.1.1192.168.2.80xfb6cName error (3)xkeubu.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.949646950 CET1.1.1.1192.168.2.80xa16Name error (3)nihrqy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.960237980 CET1.1.1.1192.168.2.80xc828Name error (3)qmfezv.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:27.970500946 CET1.1.1.1192.168.2.80xb9c5Name error (3)zjaxax.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:48.943461895 CET1.1.1.1192.168.2.80x59e4Name error (3)oxuoxj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:48.953186989 CET1.1.1.1192.168.2.80x3d23Name error (3)yuaame.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:48.963905096 CET1.1.1.1192.168.2.80x8173Name error (3)jqjyrb.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.129981041 CET1.1.1.1192.168.2.80x2a8bName error (3)epejsq.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.142441034 CET1.1.1.1192.168.2.80xa013Name error (3)jutqhm.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.304966927 CET1.1.1.1192.168.2.80x4857Name error (3)vwfafe.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.315110922 CET1.1.1.1192.168.2.80xa5dName error (3)aioade.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.326586962 CET1.1.1.1192.168.2.80x3ee2Name error (3)iieiay.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.336996078 CET1.1.1.1192.168.2.80xbf32Name error (3)hycoja.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.498584032 CET1.1.1.1192.168.2.80x7541Name error (3)ybdvhs.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.509875059 CET1.1.1.1192.168.2.80xabb3Name error (3)bitcaa.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.520354986 CET1.1.1.1192.168.2.80x2bd7Name error (3)icvsob.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.861979961 CET1.1.1.1192.168.2.80x6eccName error (3)njbjte.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.873217106 CET1.1.1.1192.168.2.80x773aName error (3)veokda.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.885520935 CET1.1.1.1192.168.2.80xf036Name error (3)rxtiio.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:49.896423101 CET1.1.1.1192.168.2.80xeedName error (3)uuruou.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.060941935 CET1.1.1.1192.168.2.80x1fb3Name error (3)hnwafy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.071346998 CET1.1.1.1192.168.2.80x5d86Name error (3)riyymn.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.082734108 CET1.1.1.1192.168.2.80x25d3Name error (3)csyyvl.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.093359947 CET1.1.1.1192.168.2.80xce97Name error (3)tcezwt.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.104197979 CET1.1.1.1192.168.2.80x6a8aName error (3)qudqik.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.114897013 CET1.1.1.1192.168.2.80x5e9cName error (3)itevsb.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.638041019 CET1.1.1.1192.168.2.80x1Name error (3)ryiyek.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.800045013 CET1.1.1.1192.168.2.80xa96bName error (3)gyinfa.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.810967922 CET1.1.1.1192.168.2.80xe0fbName error (3)tvmcoy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.821660042 CET1.1.1.1192.168.2.80x330eName error (3)ljomqy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.831649065 CET1.1.1.1192.168.2.80x180dName error (3)eahdry.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.841964960 CET1.1.1.1192.168.2.80x97aaName error (3)sxsxzp.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:50.852941036 CET1.1.1.1192.168.2.80x5732Name error (3)ekfpve.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.014122963 CET1.1.1.1192.168.2.80xea1Name error (3)ueohif.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.024272919 CET1.1.1.1192.168.2.80xad4cName error (3)oyewqz.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.034744024 CET1.1.1.1192.168.2.80xe2faName error (3)ojnqpy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.194996119 CET1.1.1.1192.168.2.80x17baName error (3)evvbut.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.369190931 CET1.1.1.1192.168.2.80x1f56Name error (3)gnyoiq.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.381172895 CET1.1.1.1192.168.2.80x8c3bName error (3)ofulyt.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.393301010 CET1.1.1.1192.168.2.80x6ce3Name error (3)ncyyfy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.551785946 CET1.1.1.1192.168.2.80x7b9bName error (3)pqrkoe.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.562875986 CET1.1.1.1192.168.2.80x495Name error (3)luuymi.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.574031115 CET1.1.1.1192.168.2.80xc57eName error (3)loauaa.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.585158110 CET1.1.1.1192.168.2.80x9d99Name error (3)mizeex.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.594937086 CET1.1.1.1192.168.2.80xa1feName error (3)ogykld.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.605928898 CET1.1.1.1192.168.2.80x7140Name error (3)uulevy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.623728991 CET1.1.1.1192.168.2.80xa447Name error (3)fpzsfa.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.633764029 CET1.1.1.1192.168.2.80x7ad6Name error (3)wjaaae.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.649527073 CET1.1.1.1192.168.2.80xaea2Name error (3)yazpuo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.661390066 CET1.1.1.1192.168.2.80x5a5eName error (3)izyqkd.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.823533058 CET1.1.1.1192.168.2.80x6d0cName error (3)shooys.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.834578037 CET1.1.1.1192.168.2.80xc00cName error (3)nthzgn.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:51.845736027 CET1.1.1.1192.168.2.80xae92Name error (3)yhnour.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:52.012582064 CET1.1.1.1192.168.2.80x2fa7Name error (3)eafaww.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:52.023865938 CET1.1.1.1192.168.2.80x9affName error (3)dccqyp.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:52.034324884 CET1.1.1.1192.168.2.80x4852Name error (3)wvonfn.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:58:52.045413971 CET1.1.1.1192.168.2.80x4c79Name error (3)jbkunk.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.208797932 CET1.1.1.1192.168.2.80xaeffName error (3)nnezan.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.224262953 CET1.1.1.1192.168.2.80xab6fName error (3)eoylnw.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.237534046 CET1.1.1.1192.168.2.80x7f9bName error (3)jdbpht.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.249871969 CET1.1.1.1192.168.2.80x197cName error (3)sliweo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.260696888 CET1.1.1.1192.168.2.80x9a26Name error (3)jyxidj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.271836042 CET1.1.1.1192.168.2.80x284eName error (3)wiybwa.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.282334089 CET1.1.1.1192.168.2.80xe305Name error (3)afvqcy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.441374063 CET1.1.1.1192.168.2.80xfaa7Name error (3)favteu.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.606719017 CET1.1.1.1192.168.2.80x9566Name error (3)jidduv.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.617566109 CET1.1.1.1192.168.2.80x16dName error (3)yntfrh.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.629246950 CET1.1.1.1192.168.2.80x94c9Name error (3)vdxuni.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.639729023 CET1.1.1.1192.168.2.80x712aName error (3)pduhba.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.812975883 CET1.1.1.1192.168.2.80x5532Name error (3)unclto.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.825613022 CET1.1.1.1192.168.2.80xdc54Name error (3)qxvfaq.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.836265087 CET1.1.1.1192.168.2.80xe70bName error (3)veuibo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:06.846323967 CET1.1.1.1192.168.2.80x466Name error (3)fsbczk.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.010788918 CET1.1.1.1192.168.2.80x3b07Name error (3)bevtua.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.022918940 CET1.1.1.1192.168.2.80xa834Name error (3)ufpirp.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.033428907 CET1.1.1.1192.168.2.80x8cc7Name error (3)azmakv.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.044606924 CET1.1.1.1192.168.2.80x68a7Name error (3)euieic.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.059453011 CET1.1.1.1192.168.2.80xadd1Name error (3)oegiuo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.218390942 CET1.1.1.1192.168.2.80x126eName error (3)ueqfel.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.381973028 CET1.1.1.1192.168.2.80x1209Name error (3)audccc.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.392991066 CET1.1.1.1192.168.2.80xb817Name error (3)ielyae.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.402645111 CET1.1.1.1192.168.2.80x8f84Name error (3)xeuyzh.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.413516045 CET1.1.1.1192.168.2.80xb58fName error (3)ukmeqc.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.575265884 CET1.1.1.1192.168.2.80xb3eName error (3)ttilzo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.732688904 CET1.1.1.1192.168.2.80x6e8Name error (3)uxuxpl.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.745672941 CET1.1.1.1192.168.2.80xf27cName error (3)oloroz.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.759087086 CET1.1.1.1192.168.2.80xc405Name error (3)qxkaoo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.770684004 CET1.1.1.1192.168.2.80x5792Name error (3)txsueo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.782800913 CET1.1.1.1192.168.2.80xc6f5Name error (3)rtkhyx.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.940789938 CET1.1.1.1192.168.2.80x83f8Name error (3)cmyayw.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.951905966 CET1.1.1.1192.168.2.80x239dName error (3)xfqora.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:07.962873936 CET1.1.1.1192.168.2.80x3619Name error (3)lnwfpg.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.122174025 CET1.1.1.1192.168.2.80xc5f8Name error (3)snjiwm.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.281109095 CET1.1.1.1192.168.2.80x3826Name error (3)nfieuq.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.411401033 CET1.1.1.1192.168.2.80x359dServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.420593023 CET1.1.1.1192.168.2.80xa2cbServer failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.446822882 CET1.1.1.1192.168.2.80x1449Name error (3)dwqzxj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.457202911 CET1.1.1.1192.168.2.80x32f1Name error (3)uayyyl.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.467772961 CET1.1.1.1192.168.2.80xcc3bName error (3)kpxpnm.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.478197098 CET1.1.1.1192.168.2.80x3d84Name error (3)xuuvfo.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.488238096 CET1.1.1.1192.168.2.80x6d25Name error (3)pvjita.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.498240948 CET1.1.1.1192.168.2.80xed66Name error (3)ubumrx.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.507699013 CET1.1.1.1192.168.2.80xe1d8Name error (3)tytzka.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.519346952 CET1.1.1.1192.168.2.80xa126Name error (3)uooqwj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.530193090 CET1.1.1.1192.168.2.80xda22Name error (3)jseegc.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.541234970 CET1.1.1.1192.168.2.80xc2c8Name error (3)uxwoff.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.551254034 CET1.1.1.1192.168.2.80x57ddName error (3)nfiyae.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.561302900 CET1.1.1.1192.168.2.80xc689Name error (3)kqpejd.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.570728064 CET1.1.1.1192.168.2.80x8ebcName error (3)qovfco.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.581228018 CET1.1.1.1192.168.2.80x524bName error (3)iofiur.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.741024971 CET1.1.1.1192.168.2.80xdc38Name error (3)hsvhuy.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.909763098 CET1.1.1.1192.168.2.80x2203Name error (3)ytvutb.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.919416904 CET1.1.1.1192.168.2.80xa920Name error (3)ylotge.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:08.931802034 CET1.1.1.1192.168.2.80x856fName error (3)kyfjqk.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:09.094412088 CET1.1.1.1192.168.2.80x1a75Name error (3)uasnos.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:09.110802889 CET1.1.1.1192.168.2.80x4dbaName error (3)ttedws.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:12.099358082 CET1.1.1.1192.168.2.80x297cName error (3)iyqdfh.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:12.110275984 CET1.1.1.1192.168.2.80xc84bName error (3)chmtuj.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:12.120338917 CET1.1.1.1192.168.2.80xbbaName error (3)scbors.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:12.276958942 CET1.1.1.1192.168.2.80x40d4Name error (3)dkyyvp.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    Jan 15, 2025 16:59:12.287694931 CET1.1.1.1192.168.2.80x5696Name error (3)orvwjv.comnonenoneA (IP address)IN (0x0001)false
                                                                                                                    • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    0192.168.2.849704104.16.166.228805568C:\Windows\mssecsvc.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:57:15.602371931 CET100OUTGET / HTTP/1.1
                                                                                                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Jan 15, 2025 16:57:16.079792023 CET778INHTTP/1.1 200 OK
                                                                                                                    Date: Wed, 15 Jan 2025 15:57:16 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 607
                                                                                                                    Connection: close
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 90270f7f185d0f97-EWR
                                                                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                                                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                    1192.168.2.84970788.198.69.4380
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:57:25.580888987 CET20OUTData Raw: 6e 28 76 8d a8 79 fc bd a0 49 34 cb 65 49 e9 81 cc 12 7d 74
                                                                                                                    Data Ascii: n(vyI4eI}t
                                                                                                                    Jan 15, 2025 16:57:25.585820913 CET26OUTData Raw: d6 a8 bc 6a 01 72 db b1 94 9c c7 a6 c2 cf 4c a6 15 79 0b 31 ff 88 06 59 63 f3
                                                                                                                    Data Ascii: jrLy1Yc


                                                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                    2192.168.2.84970888.198.69.4380
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:57:25.663785934 CET20OUTData Raw: 2e c0 72 05 4d db 85 ff e5 1c 3b 9c c0 9d 9b f9 7e 7b 53 a6
                                                                                                                    Data Ascii: .rM;~{S
                                                                                                                    Jan 15, 2025 16:57:25.668581009 CET26OUTData Raw: 6b 0a c8 3c 92 04 67 27 54 91 67 1a c1 54 67 7d aa c4 40 67 9d b0 8e 71 96 07
                                                                                                                    Data Ascii: k<g'TgTg}@gq


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    3192.168.2.849710104.16.167.228801196C:\Windows\mssecsvc.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:57:28.726372004 CET100OUTGET / HTTP/1.1
                                                                                                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Jan 15, 2025 16:57:29.208458900 CET778INHTTP/1.1 200 OK
                                                                                                                    Date: Wed, 15 Jan 2025 15:57:29 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 607
                                                                                                                    Connection: close
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 90270fd10f070cb2-EWR
                                                                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                                                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                    4192.168.2.849711104.16.167.228804432C:\Windows\mssecsvc.exe
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:57:28.794615030 CET100OUTGET / HTTP/1.1
                                                                                                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                                                                    Cache-Control: no-cache
                                                                                                                    Jan 15, 2025 16:57:29.292155027 CET778INHTTP/1.1 200 OK
                                                                                                                    Date: Wed, 15 Jan 2025 15:57:29 GMT
                                                                                                                    Content-Type: text/html
                                                                                                                    Content-Length: 607
                                                                                                                    Connection: close
                                                                                                                    Server: cloudflare
                                                                                                                    CF-RAY: 90270fd19ef47cfc-EWR
                                                                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                                                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                    5192.168.2.85007188.198.69.4380
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:58:17.033660889 CET20OUTData Raw: 90 e5 1c fd 95 7f 56 12 c8 27 89 b6 33 f3 ff 1b ab c4 82 92
                                                                                                                    Data Ascii: V'3
                                                                                                                    Jan 15, 2025 16:58:17.038501024 CET26OUTData Raw: b6 91 6a 42 ee c3 b1 78 30 d0 cd 1f f2 8f 37 38 a5 36 d1 a5 9c d1 1a b8 55 4f
                                                                                                                    Data Ascii: jBx0786UO


                                                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                    6192.168.2.85007388.198.69.4380
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:58:17.098099947 CET20OUTData Raw: 22 e5 38 e3 79 a4 df 5e 70 f2 2d 7e 79 83 b2 9e 1f d3 3b 8d
                                                                                                                    Data Ascii: "8y^p-~y;
                                                                                                                    Jan 15, 2025 16:58:17.103259087 CET26OUTData Raw: 9b 56 1e 51 c0 44 4b e0 91 1c 1f 7f 04 40 c1 84 3d 9d f6 fc 8b fc 4d a6 36 77
                                                                                                                    Data Ascii: VQDK@=M6w


                                                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                    7192.168.2.86189888.198.69.4380
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:59:08.426640987 CET20OUTData Raw: 6c 32 cf f2 93 21 f5 1c 00 dd ec 88 e7 8c 9b 79 b0 98 a0 24
                                                                                                                    Data Ascii: l2!y$
                                                                                                                    Jan 15, 2025 16:59:08.432790041 CET26OUTData Raw: e7 c9 97 87 13 71 e1 6a b0 2e bd 59 7d 68 96 f0 3e c1 5b 46 fa a3 a8 0b 89 37
                                                                                                                    Data Ascii: qj.Y}h>[F7


                                                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                    8192.168.2.86190088.198.69.4380
                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                    Jan 15, 2025 16:59:08.485380888 CET20OUTData Raw: 5b 73 1f 81 72 37 3a fe 27 22 0b 8c f2 a4 a7 47 d5 11 71 b5
                                                                                                                    Data Ascii: [sr7:'"Gq
                                                                                                                    Jan 15, 2025 16:59:08.490201950 CET26OUTData Raw: 20 a8 8a 48 22 85 6c a2 cf a6 66 a4 f7 52 e1 4e c4 0c 88 5f 7f fc 8b f9 88 3a
                                                                                                                    Data Ascii: H"lfRN_:


                                                                                                                    Click to jump to process

                                                                                                                    Click to jump to process

                                                                                                                    Click to dive into process behavior distribution

                                                                                                                    Click to jump to process

                                                                                                                    Target ID:0
                                                                                                                    Start time:10:57:10
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\loaddll32.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll"
                                                                                                                    Imagebase:0xa30000
                                                                                                                    File size:126'464 bytes
                                                                                                                    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high
                                                                                                                    Has exited:true

                                                                                                                    Target ID:1
                                                                                                                    Start time:10:57:10
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                    File size:862'208 bytes
                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high
                                                                                                                    Has exited:true

                                                                                                                    Target ID:3
                                                                                                                    Start time:10:57:11
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1
                                                                                                                    Imagebase:0xa40000
                                                                                                                    File size:236'544 bytes
                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high
                                                                                                                    Has exited:true

                                                                                                                    Target ID:4
                                                                                                                    Start time:10:57:11
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:rundll32.exe C:\Users\user\Desktop\GeW4GzT8G8.dll,PlayGame
                                                                                                                    Imagebase:0x950000
                                                                                                                    File size:61'440 bytes
                                                                                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high
                                                                                                                    Has exited:true

                                                                                                                    Target ID:5
                                                                                                                    Start time:10:57:11
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",#1
                                                                                                                    Imagebase:0x950000
                                                                                                                    File size:61'440 bytes
                                                                                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high
                                                                                                                    Has exited:true

                                                                                                                    Target ID:6
                                                                                                                    Start time:10:57:11
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\mssecsvc.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                                                                                                    Imagebase:0x400000
                                                                                                                    File size:3'751'936 bytes
                                                                                                                    MD5 hash:80F63BEA8710636ED2F30EAD25E07C82
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.1710675304.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.1712970939.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1467969506.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1709919485.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1468096628.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1710114381.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                                                                                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                                                                                                    • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Avira
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 96%, ReversingLabs
                                                                                                                    Reputation:low
                                                                                                                    Has exited:true

                                                                                                                    Target ID:7
                                                                                                                    Start time:10:57:11
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\winlogon.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:winlogon.exe
                                                                                                                    Imagebase:0x7ff6cc5a0000
                                                                                                                    File size:906'240 bytes
                                                                                                                    MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000007.00000000.1469139921.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000007.00000002.2718684916.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000007.00000002.2719199540.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Reputation:moderate
                                                                                                                    Has exited:false

                                                                                                                    Target ID:8
                                                                                                                    Start time:10:57:11
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\lsass.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\lsass.exe
                                                                                                                    Imagebase:0x7ff6b5fa0000
                                                                                                                    File size:59'456 bytes
                                                                                                                    MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000008.00000000.1472570641.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000008.00000002.2719360325.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000008.00000002.2718814793.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Reputation:moderate
                                                                                                                    Has exited:false

                                                                                                                    Target ID:9
                                                                                                                    Start time:10:57:13
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000009.00000002.2718957847.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000009.00000002.2719525179.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000009.00000000.1483800032.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Reputation:high
                                                                                                                    Has exited:false

                                                                                                                    Target ID:10
                                                                                                                    Start time:10:57:13
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\fontdrvhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:"fontdrvhost.exe"
                                                                                                                    Imagebase:0x7ff69ba10000
                                                                                                                    File size:827'408 bytes
                                                                                                                    MD5 hash:BBCB897697B3442657C7D6E3EDDBD25F
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000A.00000002.2777494237.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000A.00000002.2719121091.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000A.00000000.1492508014.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Reputation:moderate
                                                                                                                    Has exited:false

                                                                                                                    Target ID:11
                                                                                                                    Start time:10:57:14
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:rundll32.exe "C:\Users\user\Desktop\GeW4GzT8G8.dll",PlayGame
                                                                                                                    Imagebase:0x950000
                                                                                                                    File size:61'440 bytes
                                                                                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high
                                                                                                                    Has exited:true

                                                                                                                    Target ID:12
                                                                                                                    Start time:10:57:14
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\mssecsvc.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                                                                                                    Imagebase:0x400000
                                                                                                                    File size:3'751'936 bytes
                                                                                                                    MD5 hash:80F63BEA8710636ED2F30EAD25E07C82
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000002.1693222311.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000000.1495917347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1693473204.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1496071117.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                                                                    Has exited:true

                                                                                                                    Target ID:13
                                                                                                                    Start time:10:57:14
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\fontdrvhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:"fontdrvhost.exe"
                                                                                                                    Imagebase:0x7ff69ba10000
                                                                                                                    File size:827'408 bytes
                                                                                                                    MD5 hash:BBCB897697B3442657C7D6E3EDDBD25F
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000D.00000002.2777847193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000D.00000000.1495914379.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000D.00000002.2719250523.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:14
                                                                                                                    Start time:10:57:14
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\dllhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                    Imagebase:0x7ff673080000
                                                                                                                    File size:21'312 bytes
                                                                                                                    MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000E.00000002.1868184392.000000007FFF0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:true

                                                                                                                    Target ID:15
                                                                                                                    Start time:10:57:14
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k RPCSS -p
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000F.00000000.1497422002.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000F.00000002.2718214298.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000F.00000002.2777494761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:16
                                                                                                                    Start time:10:57:15
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000010.00000000.1504207342.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000010.00000002.2720025241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000010.00000002.2719387016.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:17
                                                                                                                    Start time:10:57:15
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\mssecsvc.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                                                                                                    Imagebase:0x400000
                                                                                                                    File size:3'751'936 bytes
                                                                                                                    MD5 hash:80F63BEA8710636ED2F30EAD25E07C82
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000011.00000002.2280238468.0000000000A6B000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000011.00000002.2281703950.0000000002501000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000011.00000000.1507512930.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000011.00000002.2279802499.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000011.00000002.2281362930.0000000001FD6000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000011.00000000.1507342095.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000011.00000002.2279994193.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                                                                    Has exited:true

                                                                                                                    Target ID:18
                                                                                                                    Start time:10:57:15
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\dwm.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:"dwm.exe"
                                                                                                                    Imagebase:0x7ff7751a0000
                                                                                                                    File size:94'720 bytes
                                                                                                                    MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000012.00000002.2719447551.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000012.00000002.2777701008.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000012.00000000.1507806969.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:19
                                                                                                                    Start time:10:57:15
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000013.00000000.1513385761.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000013.00000002.2718078909.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000013.00000002.2718205451.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:20
                                                                                                                    Start time:10:57:16
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000014.00000002.2719092458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000014.00000002.2718602569.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000014.00000000.1516012200.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:21
                                                                                                                    Start time:10:57:16
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000015.00000002.2719581126.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000015.00000002.2719011781.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000015.00000000.1517859323.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:22
                                                                                                                    Start time:10:57:16
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000016.00000002.2718267078.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000016.00000000.1520258438.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000016.00000002.2718209391.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:23
                                                                                                                    Start time:10:57:16
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000017.00000002.2719418097.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000017.00000002.2718893631.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000017.00000000.1522321273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:24
                                                                                                                    Start time:10:57:17
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000018.00000002.2719553271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000018.00000002.2720214040.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000018.00000000.1532350980.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:25
                                                                                                                    Start time:10:57:19
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000019.00000002.2720264639.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000019.00000002.2719630248.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000019.00000000.1545080050.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:26
                                                                                                                    Start time:10:57:19
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001A.00000002.2719776272.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001A.00000002.2720463440.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001A.00000000.1546866705.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:27
                                                                                                                    Start time:10:57:19
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001B.00000002.2718712243.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001B.00000000.1547825890.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001B.00000002.2718378800.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:28
                                                                                                                    Start time:10:57:19
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001C.00000000.1551989723.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001C.00000002.2718375782.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001C.00000002.2718656610.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:29
                                                                                                                    Start time:10:57:20
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001D.00000002.2718376405.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001D.00000000.1556664324.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001D.00000002.2718657929.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:30
                                                                                                                    Start time:10:57:20
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001E.00000002.2718396660.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001E.00000000.1562843216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001E.00000002.2718865273.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:31
                                                                                                                    Start time:10:57:21
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001F.00000000.1563869827.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001F.00000002.2718374412.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001F.00000002.2718655372.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:32
                                                                                                                    Start time:10:57:21
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000020.00000000.1570640748.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000020.00000002.2718895917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000020.00000002.2718502180.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:33
                                                                                                                    Start time:10:57:21
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000021.00000002.2718953458.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000021.00000000.1571774510.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000021.00000002.2718545796.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:34
                                                                                                                    Start time:10:57:21
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000022.00000002.2719934656.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000022.00000002.2777490892.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000022.00000000.1573456651.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:35
                                                                                                                    Start time:10:57:22
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000023.00000002.2720636903.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000023.00000000.1579253830.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000023.00000002.2720028033.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:36
                                                                                                                    Start time:10:57:22
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000024.00000000.1583741288.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000024.00000002.2718548042.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000024.00000002.2718952875.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:37
                                                                                                                    Start time:10:57:23
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000025.00000002.2718552816.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000025.00000000.1584365051.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000025.00000002.2719011282.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:38
                                                                                                                    Start time:10:57:23
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000026.00000000.1588780357.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000026.00000002.2719064286.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000026.00000000.1588816089.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000026.00000002.2718556376.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:39
                                                                                                                    Start time:10:57:23
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000027.00000002.2720101514.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000027.00000000.1588961193.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000027.00000002.2720745515.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:40
                                                                                                                    Start time:10:57:24
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:false
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000028.00000000.1594507271.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000028.00000002.2718554809.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000028.00000000.1594553743.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000028.00000002.2777706559.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Target ID:41
                                                                                                                    Start time:10:57:24
                                                                                                                    Start date:15/01/2025
                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                    File size:55'320 bytes
                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:false
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000029.00000002.2718553282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000029.00000002.2719008114.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000029.00000000.1594740605.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                    Has exited:false

                                                                                                                    Reset < >

                                                                                                                      Execution Graph

                                                                                                                      Execution Coverage:2.8%
                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                      Signature Coverage:62.4%
                                                                                                                      Total number of Nodes:655
                                                                                                                      Total number of Limit Nodes:2
                                                                                                                      execution_graph 6623 ad662d 6626 ad6647 6623->6626 6627 ad6637 6626->6627 6628 ad6652 6626->6628 6630 ad6658 6628->6630 6631 ad2574 5 API calls 6630->6631 6632 ad666a 6631->6632 6632->6627 7063 7fe31422 LookupPrivilegeValueA NtAdjustPrivilegesToken 7064 ad116f LoadLibraryA 7069 ad1196 GetProcAddress 7064->7069 7066 ad1277 7067 ad142f LookupPrivilegeValueA NtAdjustPrivilegesToken 7068 ad1180 7068->7066 7068->7067 7069->7068 6354 7fe333e0 6355 7fe333e5 6354->6355 6356 7fe3344e 6354->6356 6357 7fe3346f MapViewOfFile CloseHandle 6355->6357 6360 7fe33440 NtOpenSection 6355->6360 6358 7fe3345f NtQuerySystemInformation 6356->6358 6362 7fe335f3 6356->6362 6361 7fe334b0 6357->6361 6357->6362 6358->6357 6359 7fe334b7 UnmapViewOfFile 6359->6362 6360->6356 6361->6359 6361->6362 6652 7fe32665 6654 7fe3266b CreateThread CloseHandle 6652->6654 6655 7fe33c38 6654->6655 6657 7fe33c3d 6655->6657 6658 7fe33ca9 6657->6658 6661 7fe33c5b GetWindowsDirectoryA 6657->6661 6712 7fe3252f NtOpenSection 6658->6712 6660 7fe33cae 6663 7fe33cb5 6660->6663 6664 7fe33cfb GetSystemDirectoryA 6660->6664 6665 7fe33d26 6661->6665 6713 7fe33cc2 GetModuleHandleA 6663->6713 6757 7fe33d1f lstrcat 6664->6757 6799 7fe33d36 LoadLibraryA 6665->6799 6712->6660 6714 7fe33cde 6713->6714 6715 7fe33ccc 6713->6715 6840 7fe33cf0 GetModuleHandleA 6714->6840 6718 7fe33cd4 GetProcAddress 6715->6718 6718->6714 6758 7fe33d26 6757->6758 6759 7fe33d36 151 API calls 6758->6759 6760 7fe33d2b GetProcAddress LoadLibraryA 6759->6760 6762 7fe33d7d 6760->6762 6763 7fe310ce 2 API calls 6760->6763 6764 7fe33d92 GetTickCount 6762->6764 6763->6762 6765 7fe33daa 6764->6765 6766 7fe33e47 GetVolumeInformationA 6765->6766 6767 7fe33e7a 6766->6767 6768 7fe33f25 6767->6768 6769 7fe33eb5 96 API calls 6767->6769 6770 7fe33f31 CreateThread CloseHandle 6768->6770 6771 7fe33f4f 6768->6771 6772 7fe33ea9 6769->6772 6770->6771 6773 7fe33f60 43 API calls 6771->6773 6772->6768 6775 7fe33eca GetModuleFileNameA wsprintfA 6772->6775 6774 7fe33f54 6773->6774 6776 7fe33f7e 6774->6776 6777 7fe310ce 2 API calls 6774->6777 6778 7fe33f14 6775->6778 6779 7fe33f8f 23 API calls 6776->6779 6777->6776 6778->6768 6781 7fe33405 5 API calls 6778->6781 6780 7fe33f83 6779->6780 6782 7fe33fd6 CreateThread CloseHandle 6780->6782 6783 7fe33ffa CreateEventA 6780->6783 6781->6768 6782->6783 6786 7fe34012 6783->6786 6784 7fe34056 lstrlen 6784->6784 6785 7fe34065 gethostbyname 6784->6785 6785->6786 6786->6784 6786->6785 6787 7fe34320 RtlExitUserThread 6786->6787 6788 7fe34081 socket 6786->6788 6789 7fe342d0 SetEvent 6786->6789 6791 7fe342f2 Sleep ResetEvent 6786->6791 6792 7fe342b7 closesocket 6786->6792 6793 7fe340ef GetVersionExA 6786->6793 6794 7fe34172 wsprintfA 6786->6794 6795 7fe341a7 CreateThread CloseHandle 6786->6795 6796 7fe341f6 GetTickCount 6786->6796 6797 7fe34288 Sleep 6786->6797 6788->6786 6790 7fe340a6 connect 6788->6790 6789->6786 6790->6786 6790->6792 6791->6786 6792->6786 6793->6786 6794->6786 6795->6786 6796->6786 6797->6786 6798 7fe34294 GetTickCount 6797->6798 6798->6786 6998 7fe33d4b GetProcAddress LoadLibraryA 6799->6998 6883 7fe326d4 6840->6883 6843 7fe33d1f 179 API calls 6844 7fe33d12 GetProcAddress LoadLibraryA 6843->6844 6846 7fe33d7d 6844->6846 6847 7fe310ce 2 API calls 6844->6847 6848 7fe33d92 GetTickCount 6846->6848 6847->6846 6849 7fe33daa 6848->6849 6850 7fe33e47 GetVolumeInformationA 6849->6850 6851 7fe33e7a 6850->6851 6852 7fe33f25 6851->6852 6885 7fe33eb5 LoadLibraryA 6851->6885 6854 7fe33f31 CreateThread CloseHandle 6852->6854 6855 7fe33f4f 6852->6855 6854->6855 6917 7fe33f60 LoadLibraryA 6855->6917 6884 7fe326c8 GetSystemDirectoryA 6883->6884 6884->6843 6939 7fe33ecc GetProcAddress GetModuleFileNameA wsprintfA 6885->6939 6918 7fe310ce 2 API calls 6917->6918 6919 7fe33f7e 6918->6919 6920 7fe33f8f 23 API calls 6919->6920 6921 7fe33f83 6920->6921 6922 7fe33fd6 CreateThread CloseHandle 6921->6922 6923 7fe33ffa CreateEventA 6921->6923 6922->6923 6936 7fe34012 6923->6936 6924 7fe34056 lstrlen 6924->6924 6925 7fe34065 gethostbyname 6924->6925 6925->6936 6926 7fe34320 RtlExitUserThread 6927 7fe34081 socket 6929 7fe340a6 connect 6927->6929 6927->6936 6928 7fe342d0 SetEvent 6928->6936 6931 7fe342b7 closesocket 6929->6931 6929->6936 6930 7fe342f2 Sleep ResetEvent 6930->6936 6931->6936 6932 7fe340ef GetVersionExA 6932->6936 6933 7fe34172 wsprintfA 6933->6936 6934 7fe341a7 CreateThread CloseHandle 6934->6936 6935 7fe341f6 GetTickCount 6935->6936 6936->6924 6936->6925 6936->6926 6936->6927 6936->6928 6936->6930 6936->6931 6936->6932 6936->6933 6936->6934 6936->6935 6937 7fe34288 Sleep 6936->6937 6937->6936 6938 7fe34294 GetTickCount 6937->6938 6938->6936 6940 7fe33f14 6939->6940 6941 7fe33f25 6940->6941 6968 7fe33405 6940->6968 6943 7fe33f31 CreateThread CloseHandle 6941->6943 6944 7fe33f4f 6941->6944 6943->6944 6945 7fe33f60 43 API calls 6944->6945 6946 7fe33f54 6945->6946 6947 7fe33f7e 6946->6947 6948 7fe310ce 2 API calls 6946->6948 6977 7fe33f8f LoadLibraryA 6947->6977 6948->6947 6969 7fe3343b 6968->6969 6969->6969 6970 7fe33440 NtOpenSection 6969->6970 6971 7fe3344e 6970->6971 6972 7fe335f3 6971->6972 6973 7fe3345f NtQuerySystemInformation 6971->6973 6972->6941 6974 7fe3346f MapViewOfFile CloseHandle 6973->6974 6974->6972 6976 7fe334b0 6974->6976 6975 7fe334b7 UnmapViewOfFile 6975->6972 6976->6972 6976->6975 6978 7fe34320 RtlExitUserThread 6977->6978 6979 7fe33f9d 6977->6979 6980 7fe310ce 2 API calls 6979->6980 6981 7fe33fb5 6980->6981 6981->6978 6982 7fe33fc2 WSAStartup CreateThread CloseHandle 6981->6982 6983 7fe33ffa CreateEventA 6982->6983 6986 7fe34012 6983->6986 6984 7fe34056 lstrlen 6984->6984 6985 7fe34065 gethostbyname 6984->6985 6985->6986 6986->6978 6986->6984 6986->6985 6987 7fe34081 socket 6986->6987 6988 7fe342d0 SetEvent 6986->6988 6990 7fe342f2 Sleep ResetEvent 6986->6990 6991 7fe342b7 closesocket 6986->6991 6992 7fe340ef GetVersionExA 6986->6992 6993 7fe34172 wsprintfA 6986->6993 6994 7fe341a7 CreateThread CloseHandle 6986->6994 6995 7fe341f6 GetTickCount 6986->6995 6996 7fe34288 Sleep 6986->6996 6987->6986 6989 7fe340a6 connect 6987->6989 6988->6986 6989->6986 6989->6991 6990->6986 6991->6986 6992->6986 6993->6986 6994->6986 6995->6986 6996->6986 6997 7fe34294 GetTickCount 6996->6997 6997->6986 6999 7fe310ce 2 API calls 6998->6999 7000 7fe33d7d 6999->7000 7001 7fe33d92 GetTickCount 7000->7001 7002 7fe33daa 7001->7002 7003 7fe33e47 GetVolumeInformationA 7002->7003 7004 7fe33e7a 7003->7004 7005 7fe33f25 7004->7005 7006 7fe33eb5 96 API calls 7004->7006 7007 7fe33f31 CreateThread CloseHandle 7005->7007 7008 7fe33f4f 7005->7008 7009 7fe33ea9 7006->7009 7007->7008 7010 7fe33f60 43 API calls 7008->7010 7009->7005 7012 7fe33eca GetModuleFileNameA wsprintfA 7009->7012 7011 7fe33f54 7010->7011 7013 7fe33f7e 7011->7013 7014 7fe310ce 2 API calls 7011->7014 7015 7fe33f14 7012->7015 7016 7fe33f8f 23 API calls 7013->7016 7014->7013 7015->7005 7018 7fe33405 5 API calls 7015->7018 7017 7fe33f83 7016->7017 7019 7fe33fd6 CreateThread CloseHandle 7017->7019 7020 7fe33ffa CreateEventA 7017->7020 7018->7005 7019->7020 7033 7fe34012 7020->7033 7021 7fe34056 lstrlen 7021->7021 7022 7fe34065 gethostbyname 7021->7022 7022->7033 7023 7fe34320 RtlExitUserThread 7024 7fe34081 socket 7026 7fe340a6 connect 7024->7026 7024->7033 7025 7fe342d0 SetEvent 7025->7033 7028 7fe342b7 closesocket 7026->7028 7026->7033 7027 7fe342f2 Sleep ResetEvent 7027->7033 7028->7033 7029 7fe340ef GetVersionExA 7029->7033 7030 7fe34172 wsprintfA 7030->7033 7031 7fe341a7 CreateThread CloseHandle 7031->7033 7032 7fe341f6 GetTickCount 7032->7033 7033->7021 7033->7022 7033->7023 7033->7024 7033->7025 7033->7027 7033->7028 7033->7029 7033->7030 7033->7031 7033->7032 7034 7fe34288 Sleep 7033->7034 7034->7033 7035 7fe34294 GetTickCount 7034->7035 7035->7033 6296 7fe34c6b 6299 7fe34c9e 6296->6299 6300 7fe34caa 6299->6300 6307 7fe34499 6300->6307 6302 7fe34cb7 6303 7fe34499 5 API calls 6302->6303 6306 7fe34d64 6302->6306 6304 7fe34d58 6303->6304 6305 7fe34499 5 API calls 6304->6305 6304->6306 6305->6306 6308 7fe344a3 GetFileAttributesA 6307->6308 6309 7fe344c2 CreateFileA 6307->6309 6308->6309 6310 7fe344af SetFileAttributesA 6308->6310 6312 7fe344fc CreateFileMappingA 6309->6312 6310->6309 6314 7fe34573 MapViewOfFile 6312->6314 6316 7fe345a8 6314->6316 6316->6302 7073 ad2665 7075 ad266b CreateThread CloseHandle 7073->7075 7076 ad3c38 7075->7076 7078 ad3c3d 7076->7078 7079 ad3ca9 7078->7079 7082 ad3c5b GetWindowsDirectoryA 7078->7082 7133 ad252f NtOpenSection 7079->7133 7081 ad3cae 7084 ad3cfb GetSystemDirectoryA 7081->7084 7085 ad3cb5 7081->7085 7086 ad3d26 7082->7086 7178 ad3d1f lstrcat 7084->7178 7134 ad3cc2 GetModuleHandleA 7085->7134 7220 ad3d36 LoadLibraryA 7086->7220 7133->7081 7135 ad3ccc 7134->7135 7136 ad3cde 7134->7136 7138 ad3cd4 GetProcAddress 7135->7138 7261 ad3cf0 GetModuleHandleA 7136->7261 7138->7136 7179 ad3d26 7178->7179 7180 ad3d36 151 API calls 7179->7180 7181 ad3d2b GetProcAddress LoadLibraryA 7180->7181 7183 ad10ce 2 API calls 7181->7183 7184 ad3d7d 7183->7184 7185 ad3d92 GetTickCount 7184->7185 7186 ad3daa 7185->7186 7187 ad3e47 GetVolumeInformationA 7186->7187 7188 ad3e7a 7187->7188 7189 ad3f25 7188->7189 7190 ad3eb5 96 API calls 7188->7190 7192 ad3f4f 7189->7192 7193 ad3f31 CreateThread CloseHandle 7189->7193 7191 ad3ea9 7190->7191 7191->7189 7195 ad3f14 7191->7195 7197 ad3eca GetModuleFileNameA wsprintfA 7191->7197 7194 ad3f60 43 API calls 7192->7194 7193->7192 7196 ad3f54 7194->7196 7195->7189 7199 ad3405 5 API calls 7195->7199 7198 ad10ce 2 API calls 7196->7198 7197->7195 7200 ad3f7e 7198->7200 7199->7189 7201 ad3f8f 23 API calls 7200->7201 7202 ad3f83 7201->7202 7203 ad3ffa CreateEventA 7202->7203 7204 ad3fd3 CreateThread CloseHandle 7202->7204 7217 ad4012 7203->7217 7204->7203 7205 ad4065 gethostbyname 7205->7217 7206 ad4056 lstrlen 7206->7205 7206->7206 7207 ad4081 socket 7209 ad40a6 connect 7207->7209 7207->7217 7208 ad4320 RtlExitUserThread 7211 ad42b7 closesocket 7209->7211 7209->7217 7210 ad42d0 SetEvent 7210->7217 7211->7217 7212 ad42f2 Sleep ResetEvent 7212->7217 7213 ad40ef GetVersionExA 7213->7217 7214 ad4172 wsprintfA 7214->7217 7215 ad41a7 CreateThread CloseHandle 7215->7217 7216 ad41f6 GetTickCount 7216->7217 7217->7205 7217->7206 7217->7207 7217->7208 7217->7210 7217->7211 7217->7212 7217->7213 7217->7214 7217->7215 7217->7216 7218 ad4288 Sleep 7217->7218 7218->7217 7219 ad4294 GetTickCount 7218->7219 7219->7217 7418 ad3d4b GetProcAddress LoadLibraryA 7220->7418 7304 ad26d4 7261->7304 7264 ad3d1f 179 API calls 7265 ad3d12 GetProcAddress LoadLibraryA 7264->7265 7267 ad10ce 2 API calls 7265->7267 7268 ad3d7d 7267->7268 7269 ad3d92 GetTickCount 7268->7269 7270 ad3daa 7269->7270 7271 ad3e47 GetVolumeInformationA 7270->7271 7272 ad3e7a 7271->7272 7273 ad3f25 7272->7273 7306 ad3eb5 LoadLibraryA 7272->7306 7276 ad3f4f 7273->7276 7277 ad3f31 CreateThread CloseHandle 7273->7277 7338 ad3f60 LoadLibraryA 7276->7338 7277->7276 7305 ad26c8 GetSystemDirectoryA 7304->7305 7305->7264 7360 ad3ecc GetProcAddress GetModuleFileNameA wsprintfA 7306->7360 7339 ad3f7e 7338->7339 7340 ad10ce 2 API calls 7338->7340 7341 ad3f8f 23 API calls 7339->7341 7340->7339 7342 ad3f83 7341->7342 7343 ad3ffa CreateEventA 7342->7343 7344 ad3fd3 CreateThread CloseHandle 7342->7344 7347 ad4012 7343->7347 7344->7343 7345 ad4065 gethostbyname 7345->7347 7346 ad4056 lstrlen 7346->7345 7346->7346 7347->7345 7347->7346 7348 ad4081 socket 7347->7348 7349 ad4320 RtlExitUserThread 7347->7349 7351 ad42d0 SetEvent 7347->7351 7352 ad42b7 closesocket 7347->7352 7353 ad42f2 Sleep ResetEvent 7347->7353 7354 ad40ef GetVersionExA 7347->7354 7355 ad4172 wsprintfA 7347->7355 7356 ad41a7 CreateThread CloseHandle 7347->7356 7357 ad41f6 GetTickCount 7347->7357 7358 ad4288 Sleep 7347->7358 7348->7347 7350 ad40a6 connect 7348->7350 7350->7347 7350->7352 7351->7347 7352->7347 7353->7347 7354->7347 7355->7347 7356->7347 7357->7347 7358->7347 7359 ad4294 GetTickCount 7358->7359 7359->7347 7361 ad3f14 7360->7361 7363 ad3f25 7361->7363 7389 ad3405 7361->7389 7364 ad3f4f 7363->7364 7365 ad3f31 CreateThread CloseHandle 7363->7365 7366 ad3f60 43 API calls 7364->7366 7365->7364 7367 ad3f54 7366->7367 7368 ad10ce 2 API calls 7367->7368 7369 ad3f7e 7368->7369 7397 ad3f8f LoadLibraryA 7369->7397 7390 ad343b 7389->7390 7390->7390 7391 ad3440 NtOpenSection 7390->7391 7392 ad345f NtQuerySystemInformation 7391->7392 7396 ad35f3 7391->7396 7393 ad346f MapViewOfFile CloseHandle 7392->7393 7395 ad34b0 7393->7395 7393->7396 7394 ad34b7 UnmapViewOfFile 7394->7396 7395->7394 7395->7396 7396->7363 7398 ad3f9d 7397->7398 7399 ad4320 RtlExitUserThread 7397->7399 7400 ad10ce 2 API calls 7398->7400 7401 ad3fb5 7400->7401 7401->7399 7402 ad3fc2 WSAStartup CreateThread CloseHandle 7401->7402 7403 ad3ffa CreateEventA 7402->7403 7415 ad4012 7403->7415 7404 ad4065 gethostbyname 7404->7415 7405 ad4056 lstrlen 7405->7404 7405->7405 7406 ad4081 socket 7407 ad40a6 connect 7406->7407 7406->7415 7409 ad42b7 closesocket 7407->7409 7407->7415 7408 ad42d0 SetEvent 7408->7415 7409->7415 7410 ad42f2 Sleep ResetEvent 7410->7415 7411 ad40ef GetVersionExA 7411->7415 7412 ad4172 wsprintfA 7412->7415 7413 ad41a7 CreateThread CloseHandle 7413->7415 7414 ad41f6 GetTickCount 7414->7415 7415->7399 7415->7404 7415->7405 7415->7406 7415->7408 7415->7409 7415->7410 7415->7411 7415->7412 7415->7413 7415->7414 7416 ad4288 Sleep 7415->7416 7416->7415 7417 ad4294 GetTickCount 7416->7417 7417->7415 7419 ad3d7d 7418->7419 7420 ad10ce 2 API calls 7418->7420 7421 ad3d92 GetTickCount 7419->7421 7420->7419 7422 ad3daa 7421->7422 7423 ad3e47 GetVolumeInformationA 7422->7423 7424 ad3e7a 7423->7424 7425 ad3f25 7424->7425 7426 ad3eb5 96 API calls 7424->7426 7428 ad3f4f 7425->7428 7429 ad3f31 CreateThread CloseHandle 7425->7429 7427 ad3ea9 7426->7427 7427->7425 7431 ad3f14 7427->7431 7433 ad3eca GetModuleFileNameA wsprintfA 7427->7433 7430 ad3f60 43 API calls 7428->7430 7429->7428 7432 ad3f54 7430->7432 7431->7425 7435 ad3405 5 API calls 7431->7435 7434 ad10ce 2 API calls 7432->7434 7433->7431 7436 ad3f7e 7434->7436 7435->7425 7437 ad3f8f 23 API calls 7436->7437 7438 ad3f83 7437->7438 7439 ad3ffa CreateEventA 7438->7439 7440 ad3fd3 CreateThread CloseHandle 7438->7440 7443 ad4012 7439->7443 7440->7439 7441 ad4065 gethostbyname 7441->7443 7442 ad4056 lstrlen 7442->7441 7442->7442 7443->7441 7443->7442 7444 ad4081 socket 7443->7444 7445 ad4320 RtlExitUserThread 7443->7445 7447 ad42d0 SetEvent 7443->7447 7448 ad42b7 closesocket 7443->7448 7449 ad42f2 Sleep ResetEvent 7443->7449 7450 ad40ef GetVersionExA 7443->7450 7451 ad4172 wsprintfA 7443->7451 7452 ad41a7 CreateThread CloseHandle 7443->7452 7453 ad41f6 GetTickCount 7443->7453 7454 ad4288 Sleep 7443->7454 7444->7443 7446 ad40a6 connect 7444->7446 7446->7443 7446->7448 7447->7443 7448->7443 7449->7443 7450->7443 7451->7443 7452->7443 7453->7443 7454->7443 7455 ad4294 GetTickCount 7454->7455 7455->7443 6472 ad33e0 6473 ad33e5 6472->6473 6474 ad346f MapViewOfFile CloseHandle 6473->6474 6476 ad3440 NtOpenSection 6473->6476 6478 ad34b0 6474->6478 6479 ad35f3 6474->6479 6475 ad34b7 UnmapViewOfFile 6475->6479 6477 ad345f NtQuerySystemInformation 6476->6477 6476->6479 6477->6474 6478->6475 6478->6479 7036 ad6620 7037 ad6647 5 API calls 7036->7037 7038 ad662a 7037->7038 6480 7fe343ad 6481 7fe343b9 6480->6481 6484 7fe343dd 6481->6484 6483 7fe343c4 6487 7fe3144a LookupPrivilegeValueA NtAdjustPrivilegesToken 6484->6487 6486 7fe343e3 6486->6483 6487->6486 7039 ad1422 7040 ad142f LookupPrivilegeValueA NtAdjustPrivilegesToken 7039->7040 7459 ad2762 7461 ad2768 7459->7461 7462 ad2839 InternetCloseHandle 7461->7462 7463 ad2780 GetTempPathA 7461->7463 7471 ad27a7 GetTempFileNameA CreateFileA 7463->7471 7465 ad27a3 CreateFileA 7466 ad27ce InternetReadFile 7465->7466 7467 ad2829 InternetCloseHandle 7465->7467 7468 ad27fe CloseHandle CreateProcessA 7466->7468 7469 ad27e8 7466->7469 7467->7462 7468->7467 7469->7468 7470 ad27ea WriteFile 7469->7470 7470->7466 7470->7468 7472 ad27ce InternetReadFile 7471->7472 7473 ad2829 InternetCloseHandle 7471->7473 7474 ad27fe CloseHandle CreateProcessA 7472->7474 7475 ad27e8 7472->7475 7476 ad2839 InternetCloseHandle 7473->7476 7474->7473 7475->7474 7477 ad27ea WriteFile 7475->7477 7476->7465 7477->7472 7477->7474 6488 ad02fe 6489 ad0415 6488->6489 6491 ad042d 6489->6491 6520 ad10ce 6491->6520 6493 ad048f 6494 ad04dd 6493->6494 6495 ad04b0 GetModuleHandleA 6493->6495 6496 ad04f8 GetVersion 6494->6496 6495->6494 6497 ad050f VirtualAlloc 6496->6497 6518 ad05ca 6496->6518 6498 ad05a9 CloseHandle 6497->6498 6501 ad0532 6497->6501 6498->6518 6499 ad05d3 SetProcessAffinityMask 6527 ad05f2 GetModuleHandleA 6499->6527 6501->6498 6524 ad05ba 6501->6524 6502 ad06fc lstrcpyW 6549 ad24ae lstrcpyW lstrlenW 6502->6549 6504 ad074c NtMapViewOfSection 6504->6498 6504->6518 6505 ad0717 GetPEB lstrcpyW lstrcatW 6506 ad24ae 3 API calls 6505->6506 6506->6518 6508 ad0780 NtOpenProcessToken 6509 ad07c5 CreateToolhelp32Snapshot Process32First 6508->6509 6508->6518 6510 ad07eb Process32Next 6509->6510 6511 ad0865 CloseHandle 6510->6511 6510->6518 6511->6498 6513 ad07fd OpenProcess 6513->6510 6513->6518 6515 ad07b7 CreateToolhelp32Snapshot Process32First 6515->6510 6516 ad085c CloseHandle 6516->6510 6517 ad0834 CreateRemoteThread 6517->6516 6517->6518 6518->6498 6518->6499 6518->6502 6518->6504 6518->6505 6518->6508 6518->6510 6518->6513 6518->6515 6518->6516 6518->6517 6519 ad05ba Sleep 6518->6519 6552 ad07ac 6518->6552 6575 ad2574 6518->6575 6519->6516 6521 ad10db 6520->6521 6521->6520 6522 ad115c 6521->6522 6523 ad1133 GetModuleHandleA GetProcAddress 6521->6523 6522->6493 6523->6521 6525 ad05bf Sleep 6524->6525 6526 ad05c9 6524->6526 6525->6524 6526->6498 6528 ad10ce 2 API calls 6527->6528 6533 ad05ca 6528->6533 6529 ad05a9 CloseHandle 6529->6533 6530 ad05d3 SetProcessAffinityMask 6531 ad05f2 30 API calls 6530->6531 6531->6533 6532 ad06fc lstrcpyW 6534 ad24ae 3 API calls 6532->6534 6533->6529 6533->6530 6533->6532 6535 ad074c NtMapViewOfSection 6533->6535 6536 ad0717 GetPEB lstrcpyW lstrcatW 6533->6536 6538 ad0780 NtOpenProcessToken 6533->6538 6540 ad07eb Process32Next 6533->6540 6542 ad07ac 30 API calls 6533->6542 6543 ad07fd OpenProcess 6533->6543 6544 ad2574 5 API calls 6533->6544 6545 ad07b7 CreateToolhelp32Snapshot Process32First 6533->6545 6546 ad085c CloseHandle 6533->6546 6547 ad0834 CreateRemoteThread 6533->6547 6548 ad05ba Sleep 6533->6548 6534->6533 6535->6529 6535->6533 6537 ad24ae 3 API calls 6536->6537 6537->6533 6538->6533 6539 ad07c5 CreateToolhelp32Snapshot Process32First 6538->6539 6539->6540 6540->6533 6541 ad0865 CloseHandle 6540->6541 6541->6529 6542->6533 6543->6533 6543->6540 6544->6533 6545->6540 6546->6540 6547->6533 6547->6546 6548->6546 6550 ad69f1 6549->6550 6551 ad24ea NtCreateSection 6550->6551 6551->6518 6594 ad144a LookupPrivilegeValueA NtAdjustPrivilegesToken 6552->6594 6554 ad07b2 FreeLibrary CloseHandle 6555 ad07c5 CreateToolhelp32Snapshot Process32First 6554->6555 6556 ad07eb Process32Next 6555->6556 6557 ad0865 CloseHandle 6556->6557 6565 ad05ca 6556->6565 6558 ad05a9 CloseHandle 6557->6558 6558->6565 6559 ad07fd OpenProcess 6559->6556 6559->6565 6560 ad05d3 SetProcessAffinityMask 6562 ad05f2 29 API calls 6560->6562 6561 ad2574 5 API calls 6561->6565 6562->6565 6563 ad085c CloseHandle 6563->6556 6564 ad0834 CreateRemoteThread 6564->6563 6564->6565 6565->6556 6565->6558 6565->6559 6565->6560 6565->6561 6565->6563 6565->6564 6566 ad05ba Sleep 6565->6566 6567 ad06fc lstrcpyW 6565->6567 6569 ad074c NtMapViewOfSection 6565->6569 6570 ad0717 GetPEB lstrcpyW lstrcatW 6565->6570 6572 ad0780 NtOpenProcessToken 6565->6572 6573 ad07ac 29 API calls 6565->6573 6574 ad07b7 CreateToolhelp32Snapshot Process32First 6565->6574 6566->6563 6568 ad24ae 3 API calls 6567->6568 6568->6565 6569->6558 6569->6565 6571 ad24ae 3 API calls 6570->6571 6571->6565 6572->6555 6572->6565 6573->6565 6574->6556 6595 ad252f NtOpenSection 6575->6595 6577 ad257c 6578 ad2661 6577->6578 6579 ad2582 NtMapViewOfSection CloseHandle 6577->6579 6578->6518 6579->6578 6581 ad25ba 6579->6581 6580 ad25ef 6597 ad2477 NtProtectVirtualMemory NtWriteVirtualMemory 6580->6597 6581->6580 6596 ad2477 NtProtectVirtualMemory NtWriteVirtualMemory 6581->6596 6584 ad2600 6598 ad2477 NtProtectVirtualMemory NtWriteVirtualMemory 6584->6598 6586 ad2611 6599 ad2477 NtProtectVirtualMemory NtWriteVirtualMemory 6586->6599 6588 ad2622 6589 ad2637 6588->6589 6600 ad2477 NtProtectVirtualMemory NtWriteVirtualMemory 6588->6600 6591 ad264c 6589->6591 6601 ad2477 NtProtectVirtualMemory NtWriteVirtualMemory 6589->6601 6591->6578 6602 ad2477 NtProtectVirtualMemory NtWriteVirtualMemory 6591->6602 6594->6554 6595->6577 6596->6580 6597->6584 6598->6586 6599->6588 6600->6589 6601->6591 6602->6578 7041 ad443b 7044 ad144a LookupPrivilegeValueA NtAdjustPrivilegesToken 7041->7044 7043 ad4441 7044->7043 6363 ad13ba 6365 ad1347 6363->6365 6364 ad142f LookupPrivilegeValueA NtAdjustPrivilegesToken 6365->6364 6366 ad1403 6365->6366 7478 7fe3443b 7481 7fe3144a LookupPrivilegeValueA NtAdjustPrivilegesToken 7478->7481 7480 7fe34441 7481->7480 6317 7fe3663a 6320 7fe36647 6317->6320 6321 7fe36652 6320->6321 6322 7fe36644 6320->6322 6324 7fe36658 6321->6324 6327 7fe32574 6324->6327 6346 7fe3252f NtOpenSection 6327->6346 6329 7fe3257c 6330 7fe32582 NtMapViewOfSection CloseHandle 6329->6330 6331 7fe32661 6329->6331 6330->6331 6333 7fe325ba 6330->6333 6331->6322 6332 7fe325ef 6348 7fe32477 NtProtectVirtualMemory NtWriteVirtualMemory 6332->6348 6333->6332 6347 7fe32477 NtProtectVirtualMemory NtWriteVirtualMemory 6333->6347 6336 7fe32600 6349 7fe32477 NtProtectVirtualMemory NtWriteVirtualMemory 6336->6349 6338 7fe32611 6350 7fe32477 NtProtectVirtualMemory NtWriteVirtualMemory 6338->6350 6340 7fe32622 6341 7fe32637 6340->6341 6351 7fe32477 NtProtectVirtualMemory NtWriteVirtualMemory 6340->6351 6343 7fe3264c 6341->6343 6352 7fe32477 NtProtectVirtualMemory NtWriteVirtualMemory 6341->6352 6343->6331 6353 7fe32477 NtProtectVirtualMemory NtWriteVirtualMemory 6343->6353 6346->6329 6347->6332 6348->6336 6349->6338 6350->6340 6351->6341 6352->6343 6353->6331 6367 7fe302fe 6368 7fe30415 6367->6368 6370 7fe3042d 6368->6370 6401 7fe310ce 6370->6401 6372 7fe3048f 6373 7fe304dd 6372->6373 6374 7fe304b0 GetModuleHandleA 6372->6374 6375 7fe304f8 GetVersion 6373->6375 6374->6373 6376 7fe305ca 6375->6376 6377 7fe3050f VirtualAlloc 6375->6377 6378 7fe305a9 CloseHandle 6376->6378 6379 7fe305d3 SetProcessAffinityMask 6376->6379 6377->6378 6383 7fe30532 6377->6383 6381 7fe305f2 GetModuleHandleA 6378->6381 6408 7fe305f2 GetModuleHandleA 6379->6408 6382 7fe310ce 2 API calls 6381->6382 6399 7fe305ec 6382->6399 6383->6378 6405 7fe305ba 6383->6405 6384 7fe306fc lstrcpyW 6427 7fe324ae lstrcpyW lstrlenW 6384->6427 6387 7fe30717 GetPEB lstrcpyW lstrcatW 6389 7fe324ae 3 API calls 6387->6389 6388 7fe3074c NtMapViewOfSection 6388->6378 6388->6399 6389->6399 6390 7fe30780 NtOpenProcessToken 6391 7fe307c5 CreateToolhelp32Snapshot Process32First 6390->6391 6390->6399 6391->6399 6392 7fe307eb Process32Next 6395 7fe30865 CloseHandle 6392->6395 6392->6399 6393 7fe32574 5 API calls 6393->6399 6395->6378 6396 7fe307fd OpenProcess 6396->6392 6396->6399 6397 7fe3085c CloseHandle 6397->6392 6398 7fe30834 CreateRemoteThread 6398->6397 6398->6399 6399->6378 6399->6384 6399->6387 6399->6388 6399->6390 6399->6391 6399->6392 6399->6393 6399->6396 6399->6397 6399->6398 6400 7fe305ba Sleep 6399->6400 6430 7fe307ac 6399->6430 6400->6397 6403 7fe310db 6401->6403 6402 7fe3115c 6402->6372 6403->6401 6403->6402 6404 7fe31133 GetModuleHandleA GetProcAddress 6403->6404 6404->6403 6406 7fe305c9 6405->6406 6407 7fe305bf Sleep 6405->6407 6406->6378 6407->6405 6409 7fe310ce 2 API calls 6408->6409 6425 7fe3060e 6409->6425 6410 7fe305a9 CloseHandle 6410->6408 6411 7fe306fc lstrcpyW 6412 7fe324ae 3 API calls 6411->6412 6412->6425 6413 7fe30717 GetPEB lstrcpyW lstrcatW 6415 7fe324ae 3 API calls 6413->6415 6414 7fe3074c NtMapViewOfSection 6414->6410 6414->6425 6415->6425 6416 7fe30780 NtOpenProcessToken 6417 7fe307c5 CreateToolhelp32Snapshot Process32First 6416->6417 6416->6425 6417->6425 6418 7fe307eb Process32Next 6421 7fe30865 CloseHandle 6418->6421 6418->6425 6419 7fe32574 5 API calls 6419->6425 6420 7fe307ac 30 API calls 6420->6425 6421->6410 6422 7fe307fd OpenProcess 6422->6418 6422->6425 6423 7fe3085c CloseHandle 6423->6418 6424 7fe30834 CreateRemoteThread 6424->6423 6424->6425 6425->6410 6425->6411 6425->6413 6425->6414 6425->6416 6425->6417 6425->6418 6425->6419 6425->6420 6425->6422 6425->6423 6425->6424 6426 7fe305ba Sleep 6425->6426 6426->6423 6428 7fe369f1 6427->6428 6429 7fe324ea NtCreateSection 6428->6429 6429->6399 6452 7fe3144a LookupPrivilegeValueA NtAdjustPrivilegesToken 6430->6452 6432 7fe307b2 FreeLibrary CloseHandle 6433 7fe307c5 CreateToolhelp32Snapshot Process32First 6432->6433 6450 7fe3060e 6433->6450 6434 7fe307eb Process32Next 6436 7fe30865 CloseHandle 6434->6436 6434->6450 6435 7fe32574 5 API calls 6435->6450 6437 7fe305a9 CloseHandle 6436->6437 6440 7fe305f2 GetModuleHandleA 6437->6440 6438 7fe307fd OpenProcess 6438->6434 6438->6450 6439 7fe3085c CloseHandle 6439->6434 6442 7fe310ce 2 API calls 6440->6442 6441 7fe30834 CreateRemoteThread 6441->6439 6441->6450 6442->6450 6443 7fe305ba Sleep 6443->6439 6444 7fe306fc lstrcpyW 6445 7fe324ae 3 API calls 6444->6445 6445->6450 6446 7fe30717 GetPEB lstrcpyW lstrcatW 6448 7fe324ae 3 API calls 6446->6448 6447 7fe3074c NtMapViewOfSection 6447->6437 6447->6450 6448->6450 6449 7fe30780 NtOpenProcessToken 6449->6433 6449->6450 6450->6433 6450->6434 6450->6435 6450->6437 6450->6438 6450->6439 6450->6441 6450->6443 6450->6444 6450->6446 6450->6447 6450->6449 6451 7fe307ac 13 API calls 6450->6451 6451->6450 6452->6432 6603 ad0fcf 6604 ad10a0 6603->6604 6605 ad115c 6604->6605 6606 ad1133 GetModuleHandleA GetProcAddress 6604->6606 6606->6604 6453 ad3888 6455 ad388e GetSystemTime 6453->6455 6456 ad38d2 6455->6456 6457 ad390c Sleep 6456->6457 6458 ad3924 InternetGetConnectedState 6456->6458 6459 ad3a32 6456->6459 6460 ad3954 gethostbyname 6456->6460 6463 ad3a1f closesocket 6456->6463 6457->6456 6458->6456 6460->6456 6461 ad397a socket 6460->6461 6461->6456 6462 ad3990 ioctlsocket connect Sleep 6461->6462 6462->6456 6463->6456 7048 ad0000 7049 ad0004 7048->7049 7050 ad00a1 7049->7050 7052 ad025e 7049->7052 7056 ad0105 7052->7056 7055 ad0278 7055->7050 7057 ad0116 GetPEB 7056->7057 7057->7055 6468 ad3399 6470 ad33a2 6468->6470 6471 ad33a9 Sleep 6470->6471 6471->6471 7058 ad3819 7060 ad381f WaitForSingleObject 7058->7060 7061 ad383b closesocket 7060->7061 7062 ad3845 7060->7062 7061->7062 6618 7fe31196 GetProcAddress

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 0 ad042d-ad04a4 call ad10ce 3 ad04dd 0->3 4 ad04a6-ad04db call ad273c GetModuleHandleA 0->4 6 ad04e4-ad0509 call ad2750 GetVersion 3->6 4->6 10 ad050f-ad0530 VirtualAlloc 6->10 11 ad05ca-ad05d1 6->11 12 ad05a9-ad05b3 CloseHandle 10->12 13 ad0532-ad0562 call ad0305 10->13 11->12 14 ad05d3-ad05fc SetProcessAffinityMask call ad05f2 11->14 12->11 13->12 24 ad0564-ad057b 13->24 19 ad05fe-ad061c 14->19 20 ad0621-ad0623 14->20 19->20 22 ad064c-ad0652 20->22 23 ad0625-ad0630 20->23 22->12 27 ad0658-ad0671 22->27 25 ad0639-ad0648 23->25 26 ad0632 23->26 24->12 31 ad057d-ad05a4 call ad05ba 24->31 25->22 26->25 27->12 28 ad0677-ad0690 27->28 28->12 30 ad0696-ad069c 28->30 32 ad069e-ad06b1 30->32 33 ad06d8-ad06de 30->33 31->12 32->12 34 ad06b7-ad06bd 32->34 35 ad06fc-ad0715 lstrcpyW call ad24ae 33->35 36 ad06e0-ad06f3 33->36 34->33 37 ad06bf-ad06d2 34->37 42 ad074c-ad0775 NtMapViewOfSection 35->42 43 ad0717-ad0746 GetPEB lstrcpyW lstrcatW call ad24ae 35->43 36->35 38 ad06f5 36->38 37->12 37->33 38->35 42->12 46 ad077b-ad078f call ad0305 NtOpenProcessToken 42->46 43->12 43->42 51 ad07c5-ad07e4 CreateToolhelp32Snapshot Process32First 46->51 52 ad0791-ad07a3 call ad115d call ad07ac 46->52 54 ad07eb-ad07f5 Process32Next 51->54 62 ad080e-ad080f 52->62 63 ad07a5 52->63 56 ad0865-ad0872 CloseHandle 54->56 57 ad07f7-ad07fb 54->57 56->12 57->54 59 ad07fd-ad080d OpenProcess 57->59 59->54 61 ad080f 59->61 64 ad0810-ad0818 call ad2574 61->64 62->64 63->64 65 ad07a7-ad07e4 CreateToolhelp32Snapshot Process32First 63->65 69 ad085c-ad0863 CloseHandle 64->69 70 ad081a-ad0820 64->70 65->54 69->54 70->69 71 ad0822-ad0832 70->71 71->69 72 ad0834-ad084b CreateRemoteThread 71->72 72->69 73 ad084d-ad0857 call ad05ba 72->73 73->69
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 00AD04BE
                                                                                                                      • GetVersion.KERNEL32 ref: 00AD0500
                                                                                                                      • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 00AD0528
                                                                                                                      • CloseHandle.KERNELBASE(?), ref: 00AD05AD
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$AllocCloseModuleVersionVirtual
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt$\BaseNamedObjects\tghtVt$csrs
                                                                                                                      • API String ID: 3017432202-2040488002
                                                                                                                      • Opcode ID: 43ec0803d0a0dafcaea35956b0059ac1bcfa55dd341d92edebfb48273f019b49
                                                                                                                      • Instruction ID: b5aeabb71c89872cbe4c14c37958b3109707f2f2f0b192b73994515e41f6a88b
                                                                                                                      • Opcode Fuzzy Hash: 43ec0803d0a0dafcaea35956b0059ac1bcfa55dd341d92edebfb48273f019b49
                                                                                                                      • Instruction Fuzzy Hash: 34B1AA71605249FFEB219F24C80AFAA3BA9EF45710F00402AFD0A9E281C7F09F55CB59

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 75 ad05f2-ad0615 GetModuleHandleA call ad10ce 78 ad05a9-ad05b3 CloseHandle 75->78 79 ad0617-ad0630 75->79 82 ad05ca-ad05d1 78->82 80 ad0639-ad0648 79->80 81 ad0632 79->81 83 ad064c-ad0652 80->83 81->80 82->78 84 ad05d3-ad05fc SetProcessAffinityMask call ad05f2 82->84 83->78 85 ad0658-ad0671 83->85 90 ad05fe-ad061c 84->90 91 ad0621-ad0623 84->91 85->78 87 ad0677-ad0690 85->87 87->78 89 ad0696-ad069c 87->89 92 ad069e-ad06b1 89->92 93 ad06d8-ad06de 89->93 90->91 91->83 97 ad0625-ad0630 91->97 92->78 94 ad06b7-ad06bd 92->94 95 ad06fc-ad0715 lstrcpyW call ad24ae 93->95 96 ad06e0-ad06f3 93->96 94->93 98 ad06bf-ad06d2 94->98 102 ad074c-ad0775 NtMapViewOfSection 95->102 103 ad0717-ad0746 GetPEB lstrcpyW lstrcatW call ad24ae 95->103 96->95 99 ad06f5 96->99 97->80 97->81 98->78 98->93 99->95 102->78 105 ad077b-ad078f call ad0305 NtOpenProcessToken 102->105 103->78 103->102 109 ad07c5-ad07e4 CreateToolhelp32Snapshot Process32First 105->109 110 ad0791-ad07a3 call ad115d call ad07ac 105->110 112 ad07eb-ad07f5 Process32Next 109->112 120 ad080e-ad080f 110->120 121 ad07a5 110->121 114 ad0865-ad0872 CloseHandle 112->114 115 ad07f7-ad07fb 112->115 114->78 115->112 117 ad07fd-ad080d OpenProcess 115->117 117->112 119 ad080f 117->119 122 ad0810-ad0818 call ad2574 119->122 120->122 121->122 123 ad07a7-ad07e4 CreateToolhelp32Snapshot Process32First 121->123 127 ad085c-ad0863 CloseHandle 122->127 128 ad081a-ad0820 122->128 123->112 127->112 128->127 129 ad0822-ad0832 128->129 129->127 130 ad0834-ad084b CreateRemoteThread 129->130 130->127 131 ad084d-ad0857 call ad05ba 130->131 131->127
                                                                                                                      APIs
                                                                                                                      • CloseHandle.KERNELBASE(?), ref: 00AD05AD
                                                                                                                      • GetModuleHandleA.KERNEL32(00AD05EC), ref: 00AD05F2
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tghtVt,\BaseNamedObjects\tghtVt,?,?,?,?), ref: 00AD070A
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tghtVt,?), ref: 00AD072D
                                                                                                                      • lstrcatW.KERNEL32(\BaseNamedObjects\tghtVt,\tghtVt), ref: 00AD073B
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 00AD076B
                                                                                                                      • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 00AD0786
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD07C9
                                                                                                                      • Process32First.KERNEL32 ref: 00AD07DC
                                                                                                                      • Process32Next.KERNEL32 ref: 00AD07ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD0805
                                                                                                                      • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00AD0842
                                                                                                                      • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 00AD086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt$\BaseNamedObjects\tghtVt$csrs
                                                                                                                      • API String ID: 1545766225-2040488002
                                                                                                                      • Opcode ID: a0a38d7378b868c1c70dcdbeac2eb480934ad4b5eff30f61bc7bace271459fa5
                                                                                                                      • Instruction ID: ad180cbc28dfdbadd05de5d45660acd9b6e7a7d9aa2c13809fadb0ec4cb46e21
                                                                                                                      • Opcode Fuzzy Hash: a0a38d7378b868c1c70dcdbeac2eb480934ad4b5eff30f61bc7bace271459fa5
                                                                                                                      • Instruction Fuzzy Hash: C1719931604209FFEB219F10C84AFAE3B6DEF45310F14402AED0A9E291C7F5AF459B99

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 213 ad116f-ad1187 LoadLibraryA call ad1196 216 ad1189 213->216 217 ad11f2 213->217 218 ad11f4-ad11f8 216->218 219 ad118b-ad1192 216->219 217->218 220 ad11f9-ad120f 218->220 219->220 221 ad1194-ad11a0 219->221 222 ad11ef 220->222 223 ad1211-ad1215 220->223 224 ad11c9-ad11d8 221->224 225 ad11a2-ad11b9 221->225 226 ad125f-ad126a 222->226 227 ad11f1 222->227 228 ad127f-ad1286 223->228 229 ad1216-ad121e 223->229 235 ad11bb-ad11c7 224->235 236 ad11da-ad11dc 224->236 225->235 237 ad126b-ad1272 226->237 227->217 232 ad1287-ad129e 228->232 233 ad11e0-ad11ec 229->233 234 ad1220-ad1230 229->234 246 ad129f-ad12a4 232->246 233->222 247 ad1237-ad123a 234->247 235->224 236->233 238 ad1273 237->238 238->229 240 ad1275 238->240 244 ad123c-ad125c 240->244 245 ad1277 240->245 244->226 248 ad12a7-ad12aa 246->248 247->244 249 ad12ab-ad12b2 248->249 249->249 251 ad12b4-ad12b5 249->251 251->247 252 ad12b7-ad12b9 251->252 253 ad131b-ad131e 252->253 254 ad12bb-ad12bd 252->254 255 ad131f-ad1321 253->255 256 ad1339 253->256 257 ad12ff-ad1301 254->257 258 ad12bf-ad12c1 254->258 259 ad1383-ad138f 255->259 260 ad1322-ad1325 255->260 261 ad136b-ad136e 256->261 262 ad133b-ad133d 256->262 263 ad1333-ad1338 257->263 264 ad1302 257->264 258->238 265 ad12c3 258->265 270 ad1393-ad1396 259->270 266 ad1357 260->266 267 ad1327-ad1329 260->267 268 ad1374-ad1375 261->268 262->255 269 ad133f-ad1341 262->269 263->256 271 ad1303-ad1305 264->271 265->253 272 ad12c5 265->272 273 ad135b-ad135d 266->273 275 ad137b-ad137d 267->275 276 ad132b-ad1331 267->276 277 ad1347-ad1349 268->277 278 ad1377-ad137a 268->278 269->270 279 ad1343 269->279 280 ad1397-ad139a 270->280 271->232 281 ad1307-ad130d 271->281 272->248 274 ad12c7-ad12c9 272->274 282 ad13cf-ad13d1 273->282 283 ad135f-ad1361 273->283 274->276 284 ad12cb-ad12ce 274->284 285 ad13ed 275->285 286 ad137f-ad1382 275->286 276->263 276->271 289 ad13bb-ad13c5 277->289 290 ad134b-ad134e 277->290 278->275 287 ad139b 279->287 288 ad1345 279->288 280->287 281->246 291 ad130f-ad1311 281->291 297 ad1403-ad140a 282->297 298 ad13d3-ad13d5 282->298 294 ad1353-ad1355 283->294 295 ad1363-ad1367 283->295 296 ad12cf-ad12d1 284->296 285->286 299 ad13ef-ad13f5 285->299 286->259 287->268 300 ad139d-ad13a1 287->300 288->277 288->281 292 ad13a7-ad13af 289->292 293 ad13c7-ad13cd 289->293 290->294 291->271 301 ad1313-ad1319 291->301 292->289 293->282 310 ad142f-ad1474 LookupPrivilegeValueA NtAdjustPrivilegesToken 293->310 294->278 308 ad1356 294->308 295->261 296->271 304 ad12d3-ad12d9 296->304 305 ad13e7-ad13ec 298->305 306 ad13d7-ad13e5 298->306 299->280 313 ad13f7-ad1401 299->313 309 ad13a3-ad13a6 300->309 301->253 301->254 304->237 311 ad12db-ad12e1 304->311 305->285 306->305 306->313 308->266 309->292 314 ad12f3-ad12f9 311->314 315 ad12e3-ad12e9 311->315 313->297 313->309 314->273 318 ad12fb-ad12fe 314->318 315->273 317 ad12eb-ad12ed 315->317 317->296 319 ad12ef-ad12f2 317->319 318->257 319->314
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AD1162,00AD0796,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD116F
                                                                                                                        • Part of subcall function 00AD1196: GetProcAddress.KERNEL32(00000000,00AD1180), ref: 00AD1197
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressLibraryLoadProc
                                                                                                                      • String ID: \tghtVt
                                                                                                                      • API String ID: 2574300362-3562793120
                                                                                                                      • Opcode ID: 154f1ee51cbe90f1fc3c60f854f0224f5056baf707f0f25976c895cea551aec1
                                                                                                                      • Instruction ID: 18fbdafd9be5cd11e7b93339502ec3c983899d234666361ccd72f92aa1b1a540
                                                                                                                      • Opcode Fuzzy Hash: 154f1ee51cbe90f1fc3c60f854f0224f5056baf707f0f25976c895cea551aec1
                                                                                                                      • Instruction Fuzzy Hash: 77B17A2145CAD17BCB63CB3488899EABFB1EF63760718469FE4C34EA53D3619902C391

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 320 ad252f-ad2573 NtOpenSection
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,0000000E), ref: 00AD255E
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tghtVt, xrefs: 00AD254B
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: OpenSection
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt
                                                                                                                      • API String ID: 1950954290-4135269492
                                                                                                                      • Opcode ID: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                                                                                                      • Instruction ID: cc492c20b74137972e1aeb42a549193fdcd5baff80c1f90c3202c4eb3a6ea2fd
                                                                                                                      • Opcode Fuzzy Hash: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                                                                                                      • Instruction Fuzzy Hash: A1E0DFF1342105BAFB288B19CC07FB7220DCBC0600F048604F918DA090E6F4AF104278

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 321 ad2574-ad257c call ad252f 324 ad2661-ad2664 321->324 325 ad2582-ad25b4 NtMapViewOfSection CloseHandle 321->325 325->324 326 ad25ba-ad25c0 325->326 327 ad25ce-ad25d8 326->327 328 ad25c2-ad25cb 326->328 329 ad25ef-ad262a call ad2477 * 3 327->329 330 ad25da-ad25e2 327->330 328->327 339 ad262c-ad2632 call ad2477 329->339 340 ad2637-ad263f 329->340 330->329 331 ad25e4-ad25ea call ad2477 330->331 331->329 339->340 342 ad264c-ad2654 340->342 343 ad2641-ad2647 call ad2477 340->343 342->324 345 ad2656-ad265c call ad2477 342->345 343->342 345->324
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 00AD252F: NtOpenSection.NTDLL(?,0000000E), ref: 00AD255E
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000B7C4,00000000,?,00000002,00100000,00000040), ref: 00AD25A4
                                                                                                                      • CloseHandle.KERNELBASE(00000000,0000B7C4,00000000,?,00000002,00100000,00000040,00000000,0000B7C4,00000000,?,00AD0815), ref: 00AD25AC
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Section$CloseHandleOpenView
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2731707328-0
                                                                                                                      • Opcode ID: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                                                                                                      • Instruction ID: 7f1cd79f8d9aa3b0f2fc2bf06171cb60cb210e7a010042a9a4051dbb4f23c91e
                                                                                                                      • Opcode Fuzzy Hash: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                                                                                                      • Instruction Fuzzy Hash: 46213EB0300646BBEB24DF25DC56FA97369EFA0744F404119F81A8F2D4DBB1AE24C758

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 347 ad1422-ad1474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                                                                                                      APIs
                                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 00AD145A
                                                                                                                      • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 00AD146A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3615134276-0
                                                                                                                      • Opcode ID: a37aca55b8afbb6b8d0cee772d19627416255012f83b142472a08d4b437a2e1f
                                                                                                                      • Instruction ID: ddbff97e699881e74d61e2820170bd54818263a6fff0c1519b9bac5ac29647fb
                                                                                                                      • Opcode Fuzzy Hash: a37aca55b8afbb6b8d0cee772d19627416255012f83b142472a08d4b437a2e1f
                                                                                                                      • Instruction Fuzzy Hash: 5BF0AE36542510BBD7205F56CD8EED77F28EF533A0F144556F4484E151C2624BA5D3F4

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 349 ad2477-ad24ad NtProtectVirtualMemory NtWriteVirtualMemory
                                                                                                                      APIs
                                                                                                                      • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 00AD249B
                                                                                                                      • NtWriteVirtualMemory.NTDLL ref: 00AD24A4
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: MemoryVirtual$ProtectWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 151266762-0
                                                                                                                      • Opcode ID: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                                                                                                      • Instruction ID: 6bbb67ea70d6ee96dfa5f1d7b4d314b28acc786a60d934acbd3f762ecc45b662
                                                                                                                      • Opcode Fuzzy Hash: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                                                                                                      • Instruction Fuzzy Hash: 2AE012E07502007FF5185F55DC5FF7B391DDB41751F410208FA0A981C4F9A15E18467A

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 350 ad144a-ad1474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                                                                                                      APIs
                                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 00AD145A
                                                                                                                      • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 00AD146A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3615134276-0
                                                                                                                      • Opcode ID: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                                                                                                      • Instruction ID: ee32c209e3d0a2de55b6acbdbca8a3d00d8b73f2470e3acbbab87dcaf3c2c19a
                                                                                                                      • Opcode Fuzzy Hash: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                                                                                                      • Instruction Fuzzy Hash: F2D06731643034BBD6312A568C0EEE77D1DEF577A0F015041F9089A1A1C5A28EA1C7F5

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 356 7fe3663a-7fe36644 call 7fe36647
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 18debca8f2dd2d1ca2f8adb3937bfd968cff8255c5041bfcf825438cbb2dca55
                                                                                                                      • Instruction ID: b3c3931d59951cba16578fa1cb639dee330ebfc20cf97616865c5810de1fbb65
                                                                                                                      • Opcode Fuzzy Hash: 18debca8f2dd2d1ca2f8adb3937bfd968cff8255c5041bfcf825438cbb2dca55
                                                                                                                      • Instruction Fuzzy Hash:

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 133 ad07ac-ad07bf call ad144a FreeLibrary CloseHandle 136 ad07c5-ad07e4 CreateToolhelp32Snapshot Process32First 133->136 137 ad07eb-ad07f5 Process32Next 136->137 138 ad0865-ad0872 CloseHandle 137->138 139 ad07f7-ad07fb 137->139 140 ad05a9-ad05d1 CloseHandle 138->140 139->137 141 ad07fd-ad080d OpenProcess 139->141 145 ad05d3-ad05fc SetProcessAffinityMask call ad05f2 140->145 141->137 142 ad080f 141->142 144 ad0810-ad0818 call ad2574 142->144 150 ad085c-ad0863 CloseHandle 144->150 151 ad081a-ad0820 144->151 152 ad05fe-ad061c 145->152 153 ad0621-ad0623 145->153 150->137 151->150 154 ad0822-ad0832 151->154 152->153 156 ad064c-ad0652 153->156 157 ad0625-ad0630 153->157 154->150 155 ad0834-ad084b CreateRemoteThread 154->155 155->150 158 ad084d-ad0857 call ad05ba 155->158 156->140 161 ad0658-ad0671 156->161 159 ad0639-ad0648 157->159 160 ad0632 157->160 158->150 159->156 160->159 161->140 163 ad0677-ad0690 161->163 163->140 164 ad0696-ad069c 163->164 165 ad069e-ad06b1 164->165 166 ad06d8-ad06de 164->166 165->140 167 ad06b7-ad06bd 165->167 168 ad06fc-ad0715 lstrcpyW call ad24ae 166->168 169 ad06e0-ad06f3 166->169 167->166 170 ad06bf-ad06d2 167->170 174 ad074c-ad0775 NtMapViewOfSection 168->174 175 ad0717-ad0746 GetPEB lstrcpyW lstrcatW call ad24ae 168->175 169->168 171 ad06f5 169->171 170->140 170->166 171->168 174->140 177 ad077b-ad078f call ad0305 NtOpenProcessToken 174->177 175->140 175->174 177->136 181 ad0791-ad07a3 call ad115d call ad07ac 177->181 186 ad080e-ad080f 181->186 187 ad07a5 181->187 186->144 187->144 188 ad07a7-ad07e4 CreateToolhelp32Snapshot Process32First 187->188 188->137
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 00AD144A: LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 00AD145A
                                                                                                                        • Part of subcall function 00AD144A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 00AD146A
                                                                                                                      • CloseHandle.KERNELBASE(?), ref: 00AD05AD
                                                                                                                      • FreeLibrary.KERNEL32(75670000,?,00AD079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD07B8
                                                                                                                      • CloseHandle.KERNELBASE(?,?,00AD079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD07BF
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD07C9
                                                                                                                      • Process32First.KERNEL32 ref: 00AD07DC
                                                                                                                      • Process32Next.KERNEL32 ref: 00AD07ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD0805
                                                                                                                      • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00AD0842
                                                                                                                      • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AD085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 00AD086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                                                                                                      • String ID: csrs
                                                                                                                      • API String ID: 3908997113-2321902090
                                                                                                                      • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction ID: 5f2f39aa1cd2795fcfe2e506ebac48568c1ef95b4ea1cf308c17ff2844516835
                                                                                                                      • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction Fuzzy Hash: 9C112E70501205BBEB255F21CD4DFBF3A6DEF44701F00002EF94B9A141C6B49B019A6A

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 190 7fe34499-7fe344a1 191 7fe344a3-7fe344ad GetFileAttributesA 190->191 192 7fe344c8-7fe34504 CreateFileA 190->192 191->192 193 7fe344af-7fe344c0 SetFileAttributesA 191->193 199 7fe34527-7fe3454d 192->199 200 7fe34506-7fe3451f 192->200 193->192 195 7fe344c2 193->195 195->192 205 7fe34558-7fe34582 CreateFileMappingA 199->205 206 7fe3454f-7fe34556 199->206 200->199 204 7fe34521 200->204 204->199 209 7fe34584-7fe3458b 205->209 210 7fe3458d-7fe345a2 MapViewOfFile 205->210 206->205 209->210 212 7fe345a8-7fe345ae 210->212
                                                                                                                      APIs
                                                                                                                      • GetFileAttributesA.KERNELBASE(?,65676E61,?,?,7FE34406,?,7FE343E8,?,7FE343C4), ref: 7FE344A4
                                                                                                                      • SetFileAttributesA.KERNELBASE(?,00000000,?,65676E61,?,?,7FE34406,?,7FE343E8,?,7FE343C4), ref: 7FE344B8
                                                                                                                      • CreateFileA.KERNELBASE(?,C0000000,00000001,00000000,00000003,00000000,00000000,?,65676E61,?,?,7FE34406,?,7FE343E8,?,7FE343C4), ref: 7FE344ED
                                                                                                                      • CreateFileMappingA.KERNEL32(?,00000000,00000004,00000000,00000000,00000000,?,C0000000,00000001,00000000,00000003,00000000,00000000,?,65676E61), ref: 7FE34565
                                                                                                                      • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000,?,C0000000,00000001,00000000,00000003,00000000,00000000,?,65676E61), ref: 7FE3459A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$AttributesCreate$MappingView
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1961427682-0
                                                                                                                      • Opcode ID: a597af1445ea8736db27a55b35799f807b5cdfd84ba473e7882835a9cfdd7254
                                                                                                                      • Instruction ID: e73dce79f12e8b6eda5495139b91be11810b62e4260cc98f0af15d30b2f518a2
                                                                                                                      • Opcode Fuzzy Hash: a597af1445ea8736db27a55b35799f807b5cdfd84ba473e7882835a9cfdd7254
                                                                                                                      • Instruction Fuzzy Hash: 61213270A05309BFEF219E658D4DBBA367DAF00719F910229E91B9E090D7F0AF45C728

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 351 ad05ba-ad05bd 352 ad05bf-ad05c7 Sleep 351->352 353 ad05c9 351->353 352->351
                                                                                                                      APIs
                                                                                                                      • Sleep.KERNELBASE(0000000A,00AD085C,?,00000000,00000000,-00003C38,00000002,00000000,?,00000000), ref: 00AD05C1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3472027048-0
                                                                                                                      • Opcode ID: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                                                                                                      • Instruction ID: b5e8c8c165f064a2952de461f44a670bcd3012d8d746e1b14181ec4c74f28d58
                                                                                                                      • Opcode Fuzzy Hash: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                                                                                                      • Instruction Fuzzy Hash: F9B0123824030095DA140910640DF443B347F01B11FE0405BEA074C1C407E507001C0D

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 359 ad3c3d-ad3c59 360 ad3ca9-ad3cb3 call ad252f 359->360 361 ad3c5b-ad3c63 359->361 369 ad3cfb-ad3d43 GetSystemDirectoryA call ad3d1f 360->369 370 ad3cb5-ad3cce call ad3cc2 360->370 362 ad3c64-ad3c67 361->362 364 ad3c69-ad3c6e 362->364 365 ad3c93 362->365 364->365 367 ad3c70-ad3c91 364->367 365->362 368 ad3c95-ad3d43 GetWindowsDirectoryA call ad3d36 365->368 367->365 380 ad3d45-ad3dc0 GetProcAddress LoadLibraryA call ad10ce call ad01cb GetTickCount call ad3b76 368->380 369->380 377 ad3cd4-ad3cdc GetProcAddress 370->377 378 ad3ccf call ad26d4 370->378 381 ad3cde 377->381 382 ad3ce0-ad3d43 call ad3cf0 377->382 378->377 391 ad3dc8-ad3dcd call ad3b76 380->391 392 ad3dc2 380->392 381->382 382->380 395 ad3dcf-ad3de6 391->395 392->391 396 ad3de8-ad3df8 call ad63a0 call ad273c 395->396 401 ad3dfe-ad3e1a call ad63a0 396->401 402 ad3dfa-ad3dfc 396->402 403 ad3e1b-ad3e1c 401->403 402->403 403->396 405 ad3e1e-ad3e24 403->405 405->395 407 ad3e26-ad3e30 call ad273c 405->407 410 ad3e3f-ad3e78 call ad273c GetVolumeInformationA 407->410 411 ad3e32-ad3e3a call ad2750 407->411 415 ad3e7a-ad3e80 410->415 416 ad3e82-ad3e88 410->416 411->410 418 ad3e91-ad3e9e 415->418 417 ad3e8a 416->417 416->418 417->418 419 ad3f25 418->419 420 ad3ea4-ad3ec3 call ad3eb5 418->420 422 ad3f2f 419->422 427 ad3f1c-ad3f1e 420->427 428 ad3ec6-ad3ec8 420->428 424 ad3f4f-ad3fd1 call ad3f60 call ad10ce call ad3f8f 422->424 425 ad3f31-ad3f49 CreateThread CloseHandle 422->425 439 ad3ffa-ad400b CreateEventA 424->439 440 ad3fd3-ad3ff8 CreateThread CloseHandle 424->440 425->424 427->419 431 ad3f20 call ad3405 427->431 428->422 430 ad3eca-ad3f14 GetModuleFileNameA wsprintfA 428->430 430->427 431->419 441 ad4012-ad402a call ad37fa 439->441 440->439 444 ad402c-ad402f 441->444 445 ad4031-ad4044 call ad3b90 441->445 444->445 446 ad404c-ad4054 444->446 451 ad42be-ad42c5 445->451 452 ad404a 445->452 449 ad4065-ad406e gethostbyname 446->449 450 ad4056-ad4063 lstrlen 446->450 453 ad4315-ad431b 449->453 454 ad4074-ad407b 449->454 450->449 450->450 456 ad42c7-ad42ce 451->456 457 ad4320-ad4322 RtlExitUserThread 451->457 455 ad4081-ad40a0 socket 452->455 453->441 454->455 455->451 458 ad40a6-ad40b9 connect 455->458 459 ad42d0-ad42dc SetEvent 456->459 460 ad42e2-ad42e9 456->460 461 ad40bf-ad416e call ad273c call ad2750 GetVersionExA call ad2750 call ad3358 call ad4178 458->461 462 ad42b7-ad42b8 closesocket 458->462 459->460 463 ad42eb 460->463 464 ad42f2-ad4310 Sleep ResetEvent 460->464 475 ad4195-ad41a5 call ad3358 461->475 476 ad4170 461->476 462->451 463->464 464->441 482 ad41a7-ad41bd CreateThread CloseHandle 475->482 483 ad41c3-ad41ca 475->483 477 ad4192-ad4194 476->477 478 ad4172-ad418c wsprintfA 476->478 477->475 478->477 480 ad418e 478->480 480->477 482->483 484 ad41d0-ad41eb 483->484 486 ad41ed-ad41f4 484->486 487 ad4210-ad4214 484->487 486->487 488 ad41f6-ad4207 GetTickCount 486->488 487->462 489 ad421a-ad421c 487->489 488->487 491 ad4209 488->491 490 ad421e-ad4236 489->490 492 ad4238 490->492 493 ad423b-ad4243 490->493 491->487 492->493 493->490 494 ad4245 493->494 495 ad424b-ad424f 494->495 496 ad4261-ad4263 495->496 497 ad4251-ad4258 call ad2f08 495->497 498 ad4265-ad426f 496->498 497->462 503 ad425a 497->503 500 ad4274-ad4282 call ad6541 call ad655b 498->500 500->484 508 ad4288-ad4292 Sleep 500->508 503->498 505 ad425c-ad425f 503->505 505->495 508->500 509 ad4294-ad42a5 GetTickCount 508->509 509->484 510 ad42ab-ad42b2 509->510 510->462 510->484
                                                                                                                      APIs
                                                                                                                      • GetWindowsDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 00AD3CA1
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 00AD3CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AD3D41), ref: 00AD3D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AD3D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AD3D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AD6EF6,00000000,00000000,00000000,00000000), ref: 00AD3E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AD3EE2
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 1749273276-1603237609
                                                                                                                      • Opcode ID: 3b3a8a3192dd475763d45222a96a185a3ef968de58b42c5bf8551b3c780efb2c
                                                                                                                      • Instruction ID: a840923fb4f9b797f89e9ec815b68bb92010ae3e9a8f377fdae44797d3dfe380
                                                                                                                      • Opcode Fuzzy Hash: 3b3a8a3192dd475763d45222a96a185a3ef968de58b42c5bf8551b3c780efb2c
                                                                                                                      • Instruction Fuzzy Hash: A1020572418248BFEF319F248C4ABEA7BACEF45300F04451AE94A9E282D7F45F45C762

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 511 7fe33c3d-7fe33c59 512 7fe33c5b-7fe33c63 511->512 513 7fe33ca9-7fe33cb3 call 7fe3252f 511->513 515 7fe33c64-7fe33c67 512->515 521 7fe33cb5-7fe33cce call 7fe33cc2 513->521 522 7fe33cfb-7fe33d43 GetSystemDirectoryA call 7fe33d1f 513->522 516 7fe33c93 515->516 517 7fe33c69-7fe33c6e 515->517 516->515 520 7fe33c95-7fe33d43 GetWindowsDirectoryA call 7fe33d36 516->520 517->516 519 7fe33c70-7fe33c91 517->519 519->516 532 7fe33d45-7fe33d72 GetProcAddress LoadLibraryA 520->532 530 7fe33cd4-7fe33cdc GetProcAddress 521->530 531 7fe33ccf call 7fe326d4 521->531 522->532 535 7fe33ce0-7fe33d43 call 7fe33cf0 530->535 536 7fe33cde 530->536 531->530 533 7fe33d7d-7fe33dc0 call 7fe301cb GetTickCount call 7fe33b76 532->533 534 7fe33d78 call 7fe310ce 532->534 543 7fe33dc2 533->543 544 7fe33dc8-7fe33dcd call 7fe33b76 533->544 534->533 535->532 536->535 543->544 547 7fe33dcf-7fe33de6 544->547 548 7fe33de8-7fe33df8 call 7fe363a0 call 7fe3273c 547->548 553 7fe33dfa-7fe33dfc 548->553 554 7fe33dfe-7fe33e1a call 7fe363a0 548->554 555 7fe33e1b-7fe33e1c 553->555 554->555 555->548 558 7fe33e1e-7fe33e24 555->558 558->547 559 7fe33e26-7fe33e30 call 7fe3273c 558->559 562 7fe33e32-7fe33e3a call 7fe32750 559->562 563 7fe33e3f-7fe33e78 call 7fe3273c GetVolumeInformationA 559->563 562->563 567 7fe33e82-7fe33e88 563->567 568 7fe33e7a-7fe33e80 563->568 569 7fe33e91-7fe33e9e 567->569 570 7fe33e8a 567->570 568->569 571 7fe33f25 569->571 572 7fe33ea4-7fe33ec8 call 7fe33eb5 569->572 570->569 574 7fe33f2f 571->574 572->574 581 7fe33eca-7fe33f1e GetModuleFileNameA wsprintfA 572->581 575 7fe33f31-7fe33f49 CreateThread CloseHandle 574->575 576 7fe33f4f-7fe33f73 call 7fe33f60 574->576 575->576 582 7fe33f7e-7fe33fad call 7fe33f8f 576->582 583 7fe33f79 call 7fe310ce 576->583 581->571 586 7fe33f20 call 7fe33405 581->586 589 7fe33fd6-7fe33ff8 CreateThread CloseHandle 582->589 590 7fe33faf-7fe33fd1 582->590 583->582 586->571 592 7fe33ffa-7fe3400b CreateEventA 589->592 591 7fe33fd3 590->591 590->592 591->589 593 7fe34012-7fe3402a call 7fe337fa 592->593 596 7fe34031-7fe34044 call 7fe33b90 593->596 597 7fe3402c-7fe3402f 593->597 603 7fe3404a 596->603 604 7fe342be-7fe342c5 596->604 597->596 598 7fe3404c-7fe34054 597->598 601 7fe34056-7fe34063 lstrlen 598->601 602 7fe34065-7fe3406e gethostbyname 598->602 601->601 601->602 605 7fe34315-7fe3431b 602->605 606 7fe34074-7fe3407b 602->606 609 7fe34081-7fe340a0 socket 603->609 607 7fe34320-7fe34322 RtlExitUserThread 604->607 608 7fe342c7-7fe342ce 604->608 605->593 606->609 610 7fe342e2-7fe342e9 608->610 611 7fe342d0-7fe342dc SetEvent 608->611 609->604 612 7fe340a6-7fe340b9 connect 609->612 613 7fe342f2-7fe34310 Sleep ResetEvent 610->613 614 7fe342eb 610->614 611->610 615 7fe342b7-7fe342b8 closesocket 612->615 616 7fe340bf-7fe3416e call 7fe3273c call 7fe32750 GetVersionExA call 7fe32750 call 7fe33358 call 7fe34178 612->616 613->593 614->613 615->604 627 7fe34170 616->627 628 7fe34195-7fe341a5 call 7fe33358 616->628 629 7fe34192-7fe34194 627->629 630 7fe34172-7fe3418c wsprintfA 627->630 634 7fe341c3-7fe341ca 628->634 635 7fe341a7-7fe341bd CreateThread CloseHandle 628->635 629->628 630->629 632 7fe3418e 630->632 632->629 636 7fe341d0-7fe341eb 634->636 635->634 638 7fe34210-7fe34214 636->638 639 7fe341ed-7fe341f4 636->639 638->615 641 7fe3421a-7fe3421c 638->641 639->638 640 7fe341f6-7fe34207 GetTickCount 639->640 640->638 642 7fe34209 640->642 643 7fe3421e-7fe34236 641->643 642->638 644 7fe3423b-7fe34243 643->644 645 7fe34238 643->645 644->643 646 7fe34245 644->646 645->644 647 7fe3424b-7fe3424f 646->647 648 7fe34261-7fe34263 647->648 649 7fe34251-7fe34258 call 7fe32f08 647->649 650 7fe34265-7fe3426f 648->650 649->615 654 7fe3425a 649->654 652 7fe34274-7fe34282 call 7fe36541 call 7fe3655b 650->652 652->636 660 7fe34288-7fe34292 Sleep 652->660 654->650 656 7fe3425c-7fe3425f 654->656 656->647 660->652 661 7fe34294-7fe342a5 GetTickCount 660->661 661->636 662 7fe342ab-7fe342b2 661->662 662->615 662->636
                                                                                                                      APIs
                                                                                                                      • GetWindowsDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 7FE33CA1
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 7FE33CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE33D41), ref: 7FE33D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE33D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE33D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE36EF6,00000000,00000000,00000000,00000000), ref: 7FE33E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE33EE2
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 1749273276-1603237609
                                                                                                                      • Opcode ID: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                                                                                                      • Instruction ID: 6ea950373c88ff6d19942be58f69f6a79a8af6a3177b009621bc8366dda907a0
                                                                                                                      • Opcode Fuzzy Hash: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                                                                                                      • Instruction Fuzzy Hash: F902F371909358BFEB229F248C4EBEA7BACEF41314F404519E84A9E081D7F46F45D7A2
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00AD3CBA), ref: 00AD3CC2
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 00AD3CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AD3D41), ref: 00AD3D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AD3D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AD3D93
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 2837544101-1603237609
                                                                                                                      • Opcode ID: 9b70a38c1194afa68475894e3a227ac40eb20d30a27607f9878cba57f3019f6e
                                                                                                                      • Instruction ID: 02e09b9482b05804180a81223ab0b5ab47a6d9f312e1534a8a9ac27e19c50007
                                                                                                                      • Opcode Fuzzy Hash: 9b70a38c1194afa68475894e3a227ac40eb20d30a27607f9878cba57f3019f6e
                                                                                                                      • Instruction Fuzzy Hash: 68E11472408258BFEF359F248C0ABEA7BACEF45300F04451AEC4A9E282D6F45F45C762
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE33CBA), ref: 7FE33CC2
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 7FE33CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE33D41), ref: 7FE33D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE33D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE33D93
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 2837544101-1603237609
                                                                                                                      • Opcode ID: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                                                                                                      • Instruction ID: 412dcc43fa5b3a9f490de35ec05b951a66e951cd3606003aa13db7a26d7e3cfd
                                                                                                                      • Opcode Fuzzy Hash: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                                                                                                      • Instruction Fuzzy Hash: E8E1F271909358BFEB229F608C4EBEA7BACEF41304F404559E84A9E081D6F46F05D7A2
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00AD3CE5), ref: 00AD3CF0
                                                                                                                      • GetSystemDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 00AD3D07
                                                                                                                        • Part of subcall function 00AD3D1F: lstrcat.KERNEL32(020a00 . . :#73204497e +*,00AD3D12), ref: 00AD3D20
                                                                                                                        • Part of subcall function 00AD3D1F: GetProcAddress.KERNEL32(00000000,00AD3D41), ref: 00AD3D4C
                                                                                                                        • Part of subcall function 00AD3D1F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AD3D5F
                                                                                                                        • Part of subcall function 00AD3D1F: GetTickCount.KERNEL32 ref: 00AD3D93
                                                                                                                        • Part of subcall function 00AD3D1F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AD6EF6,00000000,00000000,00000000,00000000), ref: 00AD3E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 215653160-1603237609
                                                                                                                      • Opcode ID: 158a8434471a8ffb3d7ae248ffa9ddca1129267620db11f9b1b166f622603453
                                                                                                                      • Instruction ID: dda23f11dc64ff78c82173818eaaf1d325fff620170696acaaacbde7559aad15
                                                                                                                      • Opcode Fuzzy Hash: 158a8434471a8ffb3d7ae248ffa9ddca1129267620db11f9b1b166f622603453
                                                                                                                      • Instruction Fuzzy Hash: 54E1F272408248BFEF359F248C0ABEA7BACEF45300F04455AED4A9E282D6F45F45C766
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE33CE5), ref: 7FE33CF0
                                                                                                                      • GetSystemDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 7FE33D07
                                                                                                                        • Part of subcall function 7FE33D1F: lstrcat.KERNEL32(020a00 . . :#73204497e +*,7FE33D12), ref: 7FE33D20
                                                                                                                        • Part of subcall function 7FE33D1F: GetProcAddress.KERNEL32(00000000,7FE33D41), ref: 7FE33D4C
                                                                                                                        • Part of subcall function 7FE33D1F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE33D5F
                                                                                                                        • Part of subcall function 7FE33D1F: GetTickCount.KERNEL32 ref: 7FE33D93
                                                                                                                        • Part of subcall function 7FE33D1F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE36EF6,00000000,00000000,00000000,00000000), ref: 7FE33E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 215653160-1603237609
                                                                                                                      • Opcode ID: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                                                                                                      • Instruction ID: 1906664949ab5d7efdcb5d0e24206170f5ab5893216682b918c07ec9e1d589dc
                                                                                                                      • Opcode Fuzzy Hash: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                                                                                                      • Instruction Fuzzy Hash: 4DE1E271909358BFEB219F60CC4EBEA7BACEF41304F404659E94A9E081D6F46F05C7A5
                                                                                                                      APIs
                                                                                                                      • lstrcat.KERNEL32(020a00 . . :#73204497e +*,00AD3D12), ref: 00AD3D20
                                                                                                                        • Part of subcall function 00AD3D36: LoadLibraryA.KERNEL32(00AD3D2B), ref: 00AD3D36
                                                                                                                        • Part of subcall function 00AD3D36: GetProcAddress.KERNEL32(00000000,00AD3D41), ref: 00AD3D4C
                                                                                                                        • Part of subcall function 00AD3D36: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AD3D5F
                                                                                                                        • Part of subcall function 00AD3D36: GetTickCount.KERNEL32 ref: 00AD3D93
                                                                                                                        • Part of subcall function 00AD3D36: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AD6EF6,00000000,00000000,00000000,00000000), ref: 00AD3E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 2038497427-1603237609
                                                                                                                      • Opcode ID: 76485783ef1ebb789075038bc73b431c85142a4efb66d1d2d75da6d752c3c390
                                                                                                                      • Instruction ID: f5afb07add4ad73c440ea712160fd2925d6f660e65bf754239c2b49ed8d8ccd4
                                                                                                                      • Opcode Fuzzy Hash: 76485783ef1ebb789075038bc73b431c85142a4efb66d1d2d75da6d752c3c390
                                                                                                                      • Instruction Fuzzy Hash: D3E1E172504258BFEF35AF248C0ABEA7BACEF45300F04455AEC4A9E282D6F45F45C766
                                                                                                                      APIs
                                                                                                                      • lstrcat.KERNEL32(020a00 . . :#73204497e +*,7FE33D12), ref: 7FE33D20
                                                                                                                        • Part of subcall function 7FE33D36: LoadLibraryA.KERNEL32(7FE33D2B), ref: 7FE33D36
                                                                                                                        • Part of subcall function 7FE33D36: GetProcAddress.KERNEL32(00000000,7FE33D41), ref: 7FE33D4C
                                                                                                                        • Part of subcall function 7FE33D36: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE33D5F
                                                                                                                        • Part of subcall function 7FE33D36: GetTickCount.KERNEL32 ref: 7FE33D93
                                                                                                                        • Part of subcall function 7FE33D36: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE36EF6,00000000,00000000,00000000,00000000), ref: 7FE33E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 2038497427-1603237609
                                                                                                                      • Opcode ID: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                                                                                                      • Instruction ID: ee615c90e18cde76bc9d14ece342e8dba1a9f1ac5bbc43b99235a178c47350de
                                                                                                                      • Opcode Fuzzy Hash: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                                                                                                      • Instruction Fuzzy Hash: DEE1E171909358BFEB229F648C4EBEA7BACEF41304F404659E84A9E081D6F46F05C7A5
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AD3D2B), ref: 00AD3D36
                                                                                                                        • Part of subcall function 00AD3D4B: GetProcAddress.KERNEL32(00000000,00AD3D41), ref: 00AD3D4C
                                                                                                                        • Part of subcall function 00AD3D4B: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AD3D5F
                                                                                                                        • Part of subcall function 00AD3D4B: GetTickCount.KERNEL32 ref: 00AD3D93
                                                                                                                        • Part of subcall function 00AD3D4B: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AD6EF6,00000000,00000000,00000000,00000000), ref: 00AD3E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 3734769084-1603237609
                                                                                                                      • Opcode ID: 6f01ac3ceebeb8875c516713d47fef36de49695922c4d05a487e9876f0f81099
                                                                                                                      • Instruction ID: 6c7ed1afa3fa3e8a03bc4c215442ce4eb30ac50844100e9f868514eb234681f7
                                                                                                                      • Opcode Fuzzy Hash: 6f01ac3ceebeb8875c516713d47fef36de49695922c4d05a487e9876f0f81099
                                                                                                                      • Instruction Fuzzy Hash: 2ED1D272504248BFEF35AF24CC0ABEA7BACEF45300F04455AE94A9E282D6F45F45C766
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE33D2B), ref: 7FE33D36
                                                                                                                        • Part of subcall function 7FE33D4B: GetProcAddress.KERNEL32(00000000,7FE33D41), ref: 7FE33D4C
                                                                                                                        • Part of subcall function 7FE33D4B: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE33D5F
                                                                                                                        • Part of subcall function 7FE33D4B: GetTickCount.KERNEL32 ref: 7FE33D93
                                                                                                                        • Part of subcall function 7FE33D4B: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE36EF6,00000000,00000000,00000000,00000000), ref: 7FE33E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 3734769084-1603237609
                                                                                                                      • Opcode ID: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                                                                                                      • Instruction ID: a7ac5dbc44a0a7f076254047d33bc2984391a345398ee75791b03206c519b35d
                                                                                                                      • Opcode Fuzzy Hash: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                                                                                                      • Instruction Fuzzy Hash: 83D1E171909348BFEB219F64CC0EBEA7BACEF41304F804659E84A9E081D6F46F45C765
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AD3D41), ref: 00AD3D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AD3D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AD3D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AD6EF6,00000000,00000000,00000000,00000000), ref: 00AD3E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AD3EE2
                                                                                                                      • wsprintfA.USER32 ref: 00AD3EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,00AD3691,00000000,00000000), ref: 00AD3F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 00AD3F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AD3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AD3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AD3FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AD4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AD3B09,00000010), ref: 00AD40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AD40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AD4179
                                                                                                                      • SetEvent.KERNEL32(0000065C,?,00000000), ref: 00AD42D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 00AD42F7
                                                                                                                      • ResetEvent.KERNEL32(0000065C,?,00000000), ref: 00AD430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateEvent$CloseHandleThreadwsprintf$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolumeconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 1567941233-1603237609
                                                                                                                      • Opcode ID: 37f71bab4d2de818bdccc00d64875a05fb76d33de7a3105dbbaf66ef052a4c57
                                                                                                                      • Instruction ID: d354d07b5a5fb5547a8567dd56e549f430ba9d8e3108baa0f138abfb6002aba7
                                                                                                                      • Opcode Fuzzy Hash: 37f71bab4d2de818bdccc00d64875a05fb76d33de7a3105dbbaf66ef052a4c57
                                                                                                                      • Instruction Fuzzy Hash: 2FE1E072504258BFEF35AF248C0ABEA7BACEF45300F00455AED4A9E282D6F45F45C766
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE33D41), ref: 7FE33D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE33D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE33D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE36EF6,00000000,00000000,00000000,00000000), ref: 7FE33E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE33EE2
                                                                                                                      • wsprintfA.USER32 ref: 7FE33EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,7FE33691,00000000,00000000), ref: 7FE33F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 7FE33F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE33FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE33FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE33FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE34097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE33B09,00000010), ref: 7FE340B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE340FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE34179
                                                                                                                      • SetEvent.KERNEL32(0000065C,?,00000000), ref: 7FE342D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 7FE342F7
                                                                                                                      • ResetEvent.KERNEL32(0000065C,?,00000000), ref: 7FE3430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateEvent$CloseHandleThreadwsprintf$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolumeconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 1567941233-1603237609
                                                                                                                      • Opcode ID: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                                                                                                      • Instruction ID: b88bd265af381b496eeddd5cdecf50129738a0f978c3d376e89e404c10fc5b39
                                                                                                                      • Opcode Fuzzy Hash: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                                                                                                      • Instruction Fuzzy Hash: 10E1D071909358BFEB219F248C4DBEA7BACEF41304F804659E84A9E081D6F46F05D7A1
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 7FE304BE
                                                                                                                      • GetVersion.KERNEL32 ref: 7FE30500
                                                                                                                      • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 7FE30528
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE305AD
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$AllocCloseModuleVersionVirtual
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt$\BaseNamedObjects\tghtVt$csrs
                                                                                                                      • API String ID: 3017432202-2040488002
                                                                                                                      • Opcode ID: f890454a24b3513c1b55c4f80a054a355f1c355fc5fef7395a7dd97704e0407a
                                                                                                                      • Instruction ID: f2d113da4df35a7fcca010c4e176bb18e29a9ec588c9818d7ed7b04041dcc662
                                                                                                                      • Opcode Fuzzy Hash: f890454a24b3513c1b55c4f80a054a355f1c355fc5fef7395a7dd97704e0407a
                                                                                                                      • Instruction Fuzzy Hash: 1FB19071905349FFEB229F24C80DBEA3BA9EF45719F400128EA4A9E191C7F0AB45CB55
                                                                                                                      APIs
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE305AD
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE305EC), ref: 7FE305F2
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tghtVt,\BaseNamedObjects\tghtVt,?,?,?,?), ref: 7FE3070A
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tghtVt,?), ref: 7FE3072D
                                                                                                                      • lstrcatW.KERNEL32(\BaseNamedObjects\tghtVt,\tghtVt), ref: 7FE3073B
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 7FE3076B
                                                                                                                      • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 7FE30786
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE307C9
                                                                                                                      • Process32First.KERNEL32 ref: 7FE307DC
                                                                                                                      • Process32Next.KERNEL32 ref: 7FE307ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE30805
                                                                                                                      • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 7FE30842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE3085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 7FE3086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt$\BaseNamedObjects\tghtVt$csrs
                                                                                                                      • API String ID: 1545766225-2040488002
                                                                                                                      • Opcode ID: e7aba79f75a4323e5cb79a812cd71f4cf66a4d1f1c27252f97298980dbdbaa5f
                                                                                                                      • Instruction ID: 0518e73c093add547ba7f941b21faa3ae2e3e59a7359f80f6947c9b6bdf28503
                                                                                                                      • Opcode Fuzzy Hash: e7aba79f75a4323e5cb79a812cd71f4cf66a4d1f1c27252f97298980dbdbaa5f
                                                                                                                      • Instruction Fuzzy Hash: 84716D31905205FFEB219F10CC4DBAE3BBDEF45719F900028EA0A9E090C7B5AB45DB59
                                                                                                                      APIs
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00AD4057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00AD4066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AD4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AD3B09,00000010), ref: 00AD40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AD40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AD4179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 00AD41B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,00AD6AA2,00000000,00000000), ref: 00AD41BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AD41F6
                                                                                                                      • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,00AD6AA2,00000000,00000000), ref: 00AD428B
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AD4294
                                                                                                                      • closesocket.WS2_32(6F6C6902), ref: 00AD42B8
                                                                                                                      • SetEvent.KERNEL32(0000065C,?,00000000), ref: 00AD42D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 00AD42F7
                                                                                                                      • ResetEvent.KERNEL32(0000065C,?,00000000), ref: 00AD430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s
                                                                                                                      • API String ID: 883794535-1659677742
                                                                                                                      • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction ID: 730758dc2df67dfcddc1a0d2c75b35c581affec3b887407ac7c867a06e42359c
                                                                                                                      • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction Fuzzy Hash: 3E71CC71508258BBEF319F28881D7EE7BADAF59310F14060AE85B9E281C7F45F81C765
                                                                                                                      APIs
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE34057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE34066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE34097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE33B09,00000010), ref: 7FE340B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE340FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE34179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE341B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE36AA2,00000000,00000000), ref: 7FE341BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE341F6
                                                                                                                      • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,7FE36AA2,00000000,00000000), ref: 7FE3428B
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE34294
                                                                                                                      • closesocket.WS2_32(6F6C6902), ref: 7FE342B8
                                                                                                                      • SetEvent.KERNEL32(0000065C,?,00000000), ref: 7FE342D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 7FE342F7
                                                                                                                      • ResetEvent.KERNEL32(0000065C,?,00000000), ref: 7FE3430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s
                                                                                                                      • API String ID: 883794535-1659677742
                                                                                                                      • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction ID: 850ec88f172df83ebb353721f3422d42715e6605cffb608ae3a4e47bcf9ad285
                                                                                                                      • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction Fuzzy Hash: 9B71BC75908358BAEB219F348C1CBDEBFAEEF81314F444608E89A9E181C7F46B45C765
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 00AD344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00AD3469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00AD3493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00AD34A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 00AD34B8
                                                                                                                      Strings
                                                                                                                      • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 00AD3414
                                                                                                                      • \Device\PhysicalMemory, xrefs: 00AD33E0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                                                                                                      • API String ID: 2985292042-3938670448
                                                                                                                      • Opcode ID: ddfc636e6dc0ab4b21d6e837ee94b5ca1466fbfad68d09e9c6a5c847798fe22b
                                                                                                                      • Instruction ID: ff8af5f2ab3c54be97760de0e13a36cd877da4d44b8835ff07f330ff634fe8d6
                                                                                                                      • Opcode Fuzzy Hash: ddfc636e6dc0ab4b21d6e837ee94b5ca1466fbfad68d09e9c6a5c847798fe22b
                                                                                                                      • Instruction Fuzzy Hash: B8819AB2500208FFEB248F15CC89AAA3BBCFF44701F504659ED1A9B291D7F4AF45CA65
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE3344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE33469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE33493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE334A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 7FE334B8
                                                                                                                      Strings
                                                                                                                      • \Device\PhysicalMemory, xrefs: 7FE333E0
                                                                                                                      • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 7FE33414
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                                                                                                      • API String ID: 2985292042-3938670448
                                                                                                                      • Opcode ID: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                                                                                                      • Instruction ID: 09b820f866d5db72f37fd3c3c6a9cd7387b403e5a0efbf29bc8aeae6eafba6ec
                                                                                                                      • Opcode Fuzzy Hash: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                                                                                                      • Instruction Fuzzy Hash: 61817871900208FFEB218F14CC89EAA3BADEF44714F914618ED5A9B295D3F0AF45CB64
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 00AD344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00AD3469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00AD3493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00AD34A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 00AD34B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                                                                                                      • API String ID: 2985292042-2835701104
                                                                                                                      • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction ID: dc84df94b2327313a4315dacbd6cd82d21bade99a101226502bbab10ea47d6d6
                                                                                                                      • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction Fuzzy Hash: FA115B71140608BBEB24CF14CC59FAA367CEF88704F50451DEA1A9A2D0E7F4AF148A69
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE3344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE33469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE33493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE334A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 7FE334B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                                                                                                      • API String ID: 2985292042-2835701104
                                                                                                                      • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction ID: 24d4086a74938baf465c40eea0b54c9f0d3c2e8599ea3efd14b02b2edd75b507
                                                                                                                      • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction Fuzzy Hash: 5B115B74540708BFEB21CF10CC59FAA367DEF88704F51451CEA1A9A290E7F86F188A68
                                                                                                                      APIs
                                                                                                                      • GetTempFileNameA.KERNEL32(?,00AD27A3,00000000,?), ref: 00AD27A8
                                                                                                                      • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,00AD27A3,00000000,?), ref: 00AD27C3
                                                                                                                      • InternetReadFile.WININET(?,?,00000104), ref: 00AD27DD
                                                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,00AD27A3,00000000,?), ref: 00AD27F3
                                                                                                                      • CloseHandle.KERNEL32(?,00000104,?,00000000,?,00AD27A3,00000000,?), ref: 00AD27FF
                                                                                                                      • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,00AD27A3), ref: 00AD2823
                                                                                                                      • InternetCloseHandle.WININET(?), ref: 00AD2833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00AD283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$Create$NameProcessReadTempWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3452404049-0
                                                                                                                      • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction ID: 416d2b4848a56c1fa22eaecf65b4348e612d37d2b0875e3b49858f3f53f6a9d3
                                                                                                                      • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction Fuzzy Hash: FE116DB1100606BBEB350B20CC4AFFF7A2DEF94B10F004519FA0699180DBF59E5196A8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$AttributesCreate$MappingView
                                                                                                                      • String ID: !$&$&$($@$nr
                                                                                                                      • API String ID: 1961427682-1764398444
                                                                                                                      • Opcode ID: e19ae817f8f1e491b84cd3cf53e4234cfbd072e64c7b37fefbfdf66b025fc5a6
                                                                                                                      • Instruction ID: a612cbefa8840bfdb1d1d06307b3a9250889556ac90b50da4d421afba4f00183
                                                                                                                      • Opcode Fuzzy Hash: e19ae817f8f1e491b84cd3cf53e4234cfbd072e64c7b37fefbfdf66b025fc5a6
                                                                                                                      • Instruction Fuzzy Hash: 4B822431D0530AEFDB26CF28C84D7997BBAEF41328F944619C85A4F285D3B4AB50CB81
                                                                                                                      APIs
                                                                                                                      • lstrcpyW.KERNEL32(?,\BaseNamedObjects\tghtVt), ref: 00AD24BA
                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00AD24C1
                                                                                                                      • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 00AD2516
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tghtVt, xrefs: 00AD24B8
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateSectionlstrcpylstrlen
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt
                                                                                                                      • API String ID: 2597515329-4135269492
                                                                                                                      • Opcode ID: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction ID: 583789693dee641d0405d924fb645bf346b526b03582aa669f9b2987fe1b64ff
                                                                                                                      • Opcode Fuzzy Hash: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction Fuzzy Hash: A00181B0785344BAF7309B29CC4BF5B7929DF85B50F508558F609AE1C4DAB89A0483A9
                                                                                                                      APIs
                                                                                                                      • lstrcpyW.KERNEL32(?,\BaseNamedObjects\tghtVt), ref: 7FE324BA
                                                                                                                      • lstrlenW.KERNEL32(?), ref: 7FE324C1
                                                                                                                      • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 7FE32516
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tghtVt, xrefs: 7FE324B8
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateSectionlstrcpylstrlen
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt
                                                                                                                      • API String ID: 2597515329-4135269492
                                                                                                                      • Opcode ID: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction ID: 0292c1f03966230db6ce84df676d6ba47aebfc9b2aed9c2fd909e9cd6acd633d
                                                                                                                      • Opcode Fuzzy Hash: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction Fuzzy Hash: 240181B0785344BAF7309B29CC4BF5B7D29DF81B50F908558F608AE1C4DAB89A0483A9
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,0000000E), ref: 7FE3255E
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tghtVt, xrefs: 7FE3254B
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: OpenSection
                                                                                                                      • String ID: \BaseNamedObjects\tghtVt
                                                                                                                      • API String ID: 1950954290-4135269492
                                                                                                                      • Opcode ID: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                                                                                                      • Instruction ID: cc492c20b74137972e1aeb42a549193fdcd5baff80c1f90c3202c4eb3a6ea2fd
                                                                                                                      • Opcode Fuzzy Hash: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                                                                                                      • Instruction Fuzzy Hash: A1E0DFF1342105BAFB288B19CC07FB7220DCBC0600F048604F918DA090E6F4AF104278
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 7FE3252F: NtOpenSection.NTDLL(?,0000000E), ref: 7FE3255E
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000B7C4,00000000,?,00000002,00100000,00000040), ref: 7FE325A4
                                                                                                                      • CloseHandle.KERNEL32(00000000,0000B7C4,00000000,?,00000002,00100000,00000040,00000000,0000B7C4,00000000,?,7FE30815), ref: 7FE325AC
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Section$CloseHandleOpenView
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2731707328-0
                                                                                                                      • Opcode ID: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                                                                                                      • Instruction ID: e7d13a3e482a8da5657dd6a73886d2e4a4dda0c602ab16e83e4cbce02dadacc4
                                                                                                                      • Opcode Fuzzy Hash: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                                                                                                      • Instruction Fuzzy Hash: F8213E70700746BBDB14DE65CD59FE97369EF80A44F800118E8AA8E1D4DBB2BF14C758
                                                                                                                      APIs
                                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE3145A
                                                                                                                      • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE3146A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3615134276-0
                                                                                                                      • Opcode ID: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                                                                                                      • Instruction ID: ddbff97e699881e74d61e2820170bd54818263a6fff0c1519b9bac5ac29647fb
                                                                                                                      • Opcode Fuzzy Hash: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                                                                                                      • Instruction Fuzzy Hash: 5BF0AE36542510BBD7205F56CD8EED77F28EF533A0F144556F4484E151C2624BA5D3F4
                                                                                                                      APIs
                                                                                                                      • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 7FE3249B
                                                                                                                      • NtWriteVirtualMemory.NTDLL ref: 7FE324A4
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: MemoryVirtual$ProtectWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 151266762-0
                                                                                                                      • Opcode ID: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                                                                                                      • Instruction ID: 6bbb67ea70d6ee96dfa5f1d7b4d314b28acc786a60d934acbd3f762ecc45b662
                                                                                                                      • Opcode Fuzzy Hash: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                                                                                                      • Instruction Fuzzy Hash: 2AE012E07502007FF5185F55DC5FF7B391DDB41751F410208FA0A981C4F9A15E18467A
                                                                                                                      APIs
                                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE3145A
                                                                                                                      • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE3146A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3615134276-0
                                                                                                                      • Opcode ID: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                                                                                                      • Instruction ID: ee32c209e3d0a2de55b6acbdbca8a3d00d8b73f2470e3acbbab87dcaf3c2c19a
                                                                                                                      • Opcode Fuzzy Hash: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                                                                                                      • Instruction Fuzzy Hash: F2D06731643034BBD6312A568C0EEE77D1DEF577A0F015041F9089A1A1C5A28EA1C7F5
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                                                                                                      • Instruction ID: 406429b026924465ea2a2cd040e963c73021cb7c9ff8d88d77c809d26d1bf5b7
                                                                                                                      • Opcode Fuzzy Hash: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                                                                                                      • Instruction Fuzzy Hash: CE3118326006158BEB248F38C95079AB7F2FBA4304F10863DE557E7684D675FA89CBC0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                                                                                                      • Instruction ID: e18a2ce74cca8b86df4a39d81f49d59ab2303bce0ad49400a982515575b1261d
                                                                                                                      • Opcode Fuzzy Hash: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                                                                                                      • Instruction Fuzzy Hash: D631D372A006158BDB148E38C94479AB3F2FF84304F508638E596E7598D675F689CBC0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 96ad574b5199e4eb2ac64a3604e1e07c41d2daa1cb0973a4f29ea5e3ea57c762
                                                                                                                      • Instruction ID: 33ce09b432fd29607a36182d47245e1747817856dc38e302ef436aafa3afb5dc
                                                                                                                      • Opcode Fuzzy Hash: 96ad574b5199e4eb2ac64a3604e1e07c41d2daa1cb0973a4f29ea5e3ea57c762
                                                                                                                      • Instruction Fuzzy Hash: BA0178726041409BD720FF38CDC9FDEB7A1BB88730F10832AF5640B2C6D631A6858691
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID:
                                                                                                                      • String ID:
                                                                                                                      • API String ID:
                                                                                                                      • Opcode ID: 96ad574b5199e4eb2ac64a3604e1e07c41d2daa1cb0973a4f29ea5e3ea57c762
                                                                                                                      • Instruction ID: 888de4a15228707f089939356f70b0a19951ac6ae6b8219ea481353f72712a42
                                                                                                                      • Opcode Fuzzy Hash: 96ad574b5199e4eb2ac64a3604e1e07c41d2daa1cb0973a4f29ea5e3ea57c762
                                                                                                                      • Instruction Fuzzy Hash: 1F014972A042409BD310EF38CCCCE8EBBA1FFC4738F408355E6540A0C6D6319285C751
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AD3F83), ref: 00AD3F8F
                                                                                                                      • WSAStartup.WS2_32(00000101), ref: 00AD3FCE
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AD3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AD3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AD3FFF
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00AD4057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00AD4066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AD4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AD3B09,00000010), ref: 00AD40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AD40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AD4179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 00AD41B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,00AD6AA2,00000000,00000000), ref: 00AD41BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AD41F6
                                                                                                                      • RtlExitUserThread.NTDLL(00000000), ref: 00AD4322
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadStartupTickUserVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$ilo.brenz.pl
                                                                                                                      • API String ID: 3316401344-4285015596
                                                                                                                      • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction ID: 1dee271bfb2476958e4558e08f8fb348a07f9302348e2dd158ffe0e206f26ec2
                                                                                                                      • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction Fuzzy Hash: 7491AA71508248BBEF319F24881DBEE7BADEF49310F04064AE95A9E281C3F45F45DB65
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE33F83), ref: 7FE33F8F
                                                                                                                      • WSAStartup.WS2_32(00000101), ref: 7FE33FCE
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE33FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE33FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE33FFF
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE34057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE34066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE34097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE33B09,00000010), ref: 7FE340B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE340FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE34179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE341B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE36AA2,00000000,00000000), ref: 7FE341BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE341F6
                                                                                                                      • RtlExitUserThread.NTDLL(00000000), ref: 7FE34322
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadStartupTickUserVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$ilo.brenz.pl
                                                                                                                      • API String ID: 3316401344-4285015596
                                                                                                                      • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction ID: 7c9fe536247a5c46780dff2f9914419c1c0cb6178aa26be29099f7198b49843c
                                                                                                                      • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction Fuzzy Hash: 4791AA75908348BAEB219F348C1DBDE7BADEF41304F804648E89AAE181C3F46F45DB65
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AD3EA9), ref: 00AD3EB5
                                                                                                                        • Part of subcall function 00AD3ECC: GetProcAddress.KERNEL32(00000000,00AD3EC0), ref: 00AD3ECD
                                                                                                                        • Part of subcall function 00AD3ECC: GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AD3EE2
                                                                                                                        • Part of subcall function 00AD3ECC: wsprintfA.USER32 ref: 00AD3EF7
                                                                                                                        • Part of subcall function 00AD3ECC: CreateThread.KERNEL32(00000000,00000000,00AD3691,00000000,00000000), ref: 00AD3F40
                                                                                                                        • Part of subcall function 00AD3ECC: CloseHandle.KERNEL32(?,780B832E), ref: 00AD3F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AD3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AD3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AD3FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AD4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AD3B09,00000010), ref: 00AD40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AD40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AD4179
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleThreadwsprintf$AddressEventFileLibraryLoadModuleNameProcVersionconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 4150863296-4169101916
                                                                                                                      • Opcode ID: 09b915f81939338777e2238991f3bc6e2e241302df667124e3c5a6440f8bf480
                                                                                                                      • Instruction ID: 08f1bd5ea2bd24c7f0372729cedc65329d68dd3f00e419b087008677bef09674
                                                                                                                      • Opcode Fuzzy Hash: 09b915f81939338777e2238991f3bc6e2e241302df667124e3c5a6440f8bf480
                                                                                                                      • Instruction Fuzzy Hash: F5A1E472508248BFEF219F248C5EBEA7BACEF45300F04454AF84A9E282D6F45F45C766
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE33EA9), ref: 7FE33EB5
                                                                                                                        • Part of subcall function 7FE33ECC: GetProcAddress.KERNEL32(00000000,7FE33EC0), ref: 7FE33ECD
                                                                                                                        • Part of subcall function 7FE33ECC: GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE33EE2
                                                                                                                        • Part of subcall function 7FE33ECC: wsprintfA.USER32 ref: 7FE33EF7
                                                                                                                        • Part of subcall function 7FE33ECC: CreateThread.KERNEL32(00000000,00000000,7FE33691,00000000,00000000), ref: 7FE33F40
                                                                                                                        • Part of subcall function 7FE33ECC: CloseHandle.KERNEL32(?,780B832E), ref: 7FE33F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE33FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE33FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE33FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE34097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE33B09,00000010), ref: 7FE340B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE340FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE34179
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleThreadwsprintf$AddressEventFileLibraryLoadModuleNameProcVersionconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 4150863296-4169101916
                                                                                                                      • Opcode ID: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                                                                                                      • Instruction ID: 8c693793d3f8c52ddfbca026fea98ca92c48d2b5aba2df9ab50300905babb0d3
                                                                                                                      • Opcode Fuzzy Hash: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                                                                                                      • Instruction Fuzzy Hash: CCA1FF71909348BFEB219F248C5DBEA7BACEF41304F404659E84A9E181D6F46F05CBA6
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AD3EC0), ref: 00AD3ECD
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AD3EE2
                                                                                                                      • wsprintfA.USER32 ref: 00AD3EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,00AD3691,00000000,00000000), ref: 00AD3F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 00AD3F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AD3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AD3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AD3FFF
                                                                                                                        • Part of subcall function 00AD3405: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 00AD344A
                                                                                                                        • Part of subcall function 00AD3405: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00AD3469
                                                                                                                        • Part of subcall function 00AD3405: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00AD3493
                                                                                                                        • Part of subcall function 00AD3405: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00AD34A0
                                                                                                                        • Part of subcall function 00AD3405: UnmapViewOfFile.KERNEL32(?), ref: 00AD34B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmapwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 541178049-4169101916
                                                                                                                      • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction ID: 3b08a6f21a6f032fc46ac7b09b2da2e8ea85c946e13ce13a66d453487ac4a884
                                                                                                                      • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction Fuzzy Hash: 50A1F172508258BFEF219F248C5EBEA7BACEF45300F04464AF84A9E281D6F45F45C766
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE33EC0), ref: 7FE33ECD
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE33EE2
                                                                                                                      • wsprintfA.USER32 ref: 7FE33EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,7FE33691,00000000,00000000), ref: 7FE33F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 7FE33F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE33FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE33FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE33FFF
                                                                                                                        • Part of subcall function 7FE33405: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE3344A
                                                                                                                        • Part of subcall function 7FE33405: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE33469
                                                                                                                        • Part of subcall function 7FE33405: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE33493
                                                                                                                        • Part of subcall function 7FE33405: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE334A0
                                                                                                                        • Part of subcall function 7FE33405: UnmapViewOfFile.KERNEL32(?), ref: 7FE334B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmapwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                                                                                                      • API String ID: 541178049-4169101916
                                                                                                                      • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction ID: 2f45cce052406d23afa77e2cf8ce3f3404a47b32eaf5d539eb941ba2e693fe40
                                                                                                                      • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction Fuzzy Hash: A6A1F171909348BFEB219F248C5DBEA7BACEF41304F404659E84A9E181D6F46F05CBA5
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AD3F54), ref: 00AD3F60
                                                                                                                        • Part of subcall function 00AD3F8F: LoadLibraryA.KERNEL32(00AD3F83), ref: 00AD3F8F
                                                                                                                        • Part of subcall function 00AD3F8F: WSAStartup.WS2_32(00000101), ref: 00AD3FCE
                                                                                                                        • Part of subcall function 00AD3F8F: CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AD3FE9
                                                                                                                        • Part of subcall function 00AD3F8F: CloseHandle.KERNEL32(?,00000000), ref: 00AD3FF2
                                                                                                                        • Part of subcall function 00AD3F8F: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AD3FFF
                                                                                                                        • Part of subcall function 00AD3F8F: socket.WS2_32(00000002,00000001,00000000), ref: 00AD4097
                                                                                                                        • Part of subcall function 00AD3F8F: connect.WS2_32(6F6C6902,00AD3B09,00000010), ref: 00AD40B1
                                                                                                                        • Part of subcall function 00AD3F8F: GetVersionExA.KERNEL32(?,?,00000000), ref: 00AD40FB
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00AD4057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00AD4066
                                                                                                                      • wsprintfA.USER32 ref: 00AD4179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 00AD41B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,00AD6AA2,00000000,00000000), ref: 00AD41BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AD41F6
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleLibraryLoadThread$CountEventStartupTickVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s
                                                                                                                      • API String ID: 2996464229-1659677742
                                                                                                                      • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction ID: bd2c8825c1dd08b9171a9b9158a60f6e36d50570ec79d58d1db4fb8ca26d2939
                                                                                                                      • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction Fuzzy Hash: EE81E072508258BFEB219F348C5DBEA7BACEF45310F04465AE85A9E2C2C2F45F45C762
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE33F54), ref: 7FE33F60
                                                                                                                        • Part of subcall function 7FE33F8F: LoadLibraryA.KERNEL32(7FE33F83), ref: 7FE33F8F
                                                                                                                        • Part of subcall function 7FE33F8F: WSAStartup.WS2_32(00000101), ref: 7FE33FCE
                                                                                                                        • Part of subcall function 7FE33F8F: CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE33FE9
                                                                                                                        • Part of subcall function 7FE33F8F: CloseHandle.KERNEL32(?,00000000), ref: 7FE33FF2
                                                                                                                        • Part of subcall function 7FE33F8F: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE33FFF
                                                                                                                        • Part of subcall function 7FE33F8F: socket.WS2_32(00000002,00000001,00000000), ref: 7FE34097
                                                                                                                        • Part of subcall function 7FE33F8F: connect.WS2_32(6F6C6902,7FE33B09,00000010), ref: 7FE340B1
                                                                                                                        • Part of subcall function 7FE33F8F: GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE340FB
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE34057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE34066
                                                                                                                      • wsprintfA.USER32 ref: 7FE34179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE341B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE36AA2,00000000,00000000), ref: 7FE341BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE341F6
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleLibraryLoadThread$CountEventStartupTickVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s
                                                                                                                      • API String ID: 2996464229-1659677742
                                                                                                                      • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction ID: 7cf70be6cf959998afdf9cae9a0d37e707ada541d42a8e21ccd1522646daf2c4
                                                                                                                      • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction Fuzzy Hash: 8981F071908358BFEB219F348C5DBDA7BADEF41304F444659E88A9E181C2F46F45C7A2
                                                                                                                      APIs
                                                                                                                      • GetSystemTime.KERNEL32(00AD7584), ref: 00AD389F
                                                                                                                      • Sleep.KERNEL32(0000EA60), ref: 00AD3911
                                                                                                                      • InternetGetConnectedState.WININET(?,00000000), ref: 00AD392A
                                                                                                                      • gethostbyname.WS2_32(0D278125), ref: 00AD396C
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AD3981
                                                                                                                      • ioctlsocket.WS2_32(?,8004667E), ref: 00AD399A
                                                                                                                      • connect.WS2_32(?,?,00000010), ref: 00AD39B3
                                                                                                                      • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 00AD39C1
                                                                                                                      • closesocket.WS2_32 ref: 00AD3A20
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep$ConnectedInternetStateSystemTimeclosesocketconnectgethostbynameioctlsocketsocket
                                                                                                                      • String ID: yhnour.com
                                                                                                                      • API String ID: 159131500-3038085945
                                                                                                                      • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction ID: 51a423ed92cfa5614b418316ddd3809860dbdd79367e0d44137d88c4f82f0b83
                                                                                                                      • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction Fuzzy Hash: 1141B432604248BADF319F248C5EB9D7B6EAF85710F04402AF94ADE2C1D7F59F408721
                                                                                                                      APIs
                                                                                                                      • GetSystemTime.KERNEL32(7FE37584), ref: 7FE3389F
                                                                                                                      • Sleep.KERNEL32(0000EA60), ref: 7FE33911
                                                                                                                      • InternetGetConnectedState.WININET(?,00000000), ref: 7FE3392A
                                                                                                                      • gethostbyname.WS2_32(0D278125), ref: 7FE3396C
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE33981
                                                                                                                      • ioctlsocket.WS2_32(?,8004667E), ref: 7FE3399A
                                                                                                                      • connect.WS2_32(?,?,00000010), ref: 7FE339B3
                                                                                                                      • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 7FE339C1
                                                                                                                      • closesocket.WS2_32 ref: 7FE33A20
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep$ConnectedInternetStateSystemTimeclosesocketconnectgethostbynameioctlsocketsocket
                                                                                                                      • String ID: yhnour.com
                                                                                                                      • API String ID: 159131500-3038085945
                                                                                                                      • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction ID: b07a7bcf83e6419e821945e762614e4a8bec5a082f9a477666759957ccd44e88
                                                                                                                      • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction Fuzzy Hash: 8441B131A04348BEEB218E208C4EBDABBAEEF85714F404129F94ADE1C1D7F59B40D720
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 7FE3144A: LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE3145A
                                                                                                                        • Part of subcall function 7FE3144A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE3146A
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE305AD
                                                                                                                      • FreeLibrary.KERNEL32(75670000,?,7FE3079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE307B8
                                                                                                                      • CloseHandle.KERNEL32(?,?,7FE3079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE307BF
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE307C9
                                                                                                                      • Process32First.KERNEL32 ref: 7FE307DC
                                                                                                                      • Process32Next.KERNEL32 ref: 7FE307ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE30805
                                                                                                                      • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 7FE30842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE3085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 7FE3086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                                                                                                      • String ID: csrs
                                                                                                                      • API String ID: 3908997113-2321902090
                                                                                                                      • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction ID: 3cc730a2f3ef03ba179077d9d1a3c9c733a6918c7a23fe3b4e4107910752f9d1
                                                                                                                      • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction Fuzzy Hash: 5E113030902205BBEB255F21CD4DBBF3A7DEF44715F40012CFA4B99041CAB49B05CA6A
                                                                                                                      APIs
                                                                                                                      • GetTempPathA.KERNEL32(00000104), ref: 00AD278C
                                                                                                                        • Part of subcall function 00AD27A7: GetTempFileNameA.KERNEL32(?,00AD27A3,00000000,?), ref: 00AD27A8
                                                                                                                        • Part of subcall function 00AD27A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,00AD27A3,00000000,?), ref: 00AD27C3
                                                                                                                        • Part of subcall function 00AD27A7: InternetReadFile.WININET(?,?,00000104), ref: 00AD27DD
                                                                                                                        • Part of subcall function 00AD27A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,00AD27A3,00000000,?), ref: 00AD27F3
                                                                                                                        • Part of subcall function 00AD27A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,00AD27A3,00000000,?), ref: 00AD27FF
                                                                                                                        • Part of subcall function 00AD27A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,00AD27A3), ref: 00AD2823
                                                                                                                        • Part of subcall function 00AD27A7: InternetCloseHandle.WININET(?), ref: 00AD2833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00AD283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$CreateTemp$NamePathProcessReadWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1995088466-0
                                                                                                                      • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction ID: 36b17062a8ad0b429b00ad0a499ec7ab323161c4023bd03befe83610c844b935
                                                                                                                      • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction Fuzzy Hash: B42190B1144206BFE7315B20CC8EFFF7A2DEFA5B10F000519FA4A99182D7B19E55C6A6
                                                                                                                      APIs
                                                                                                                      • GetTempPathA.KERNEL32(00000104), ref: 7FE3278C
                                                                                                                        • Part of subcall function 7FE327A7: GetTempFileNameA.KERNEL32(?,7FE327A3,00000000,?), ref: 7FE327A8
                                                                                                                        • Part of subcall function 7FE327A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE327A3,00000000,?), ref: 7FE327C3
                                                                                                                        • Part of subcall function 7FE327A7: InternetReadFile.WININET(?,?,00000104), ref: 7FE327DD
                                                                                                                        • Part of subcall function 7FE327A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE327A3,00000000,?), ref: 7FE327F3
                                                                                                                        • Part of subcall function 7FE327A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE327A3,00000000,?), ref: 7FE327FF
                                                                                                                        • Part of subcall function 7FE327A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE327A3), ref: 7FE32823
                                                                                                                        • Part of subcall function 7FE327A7: InternetCloseHandle.WININET(?), ref: 7FE32833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 7FE3283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$CreateTemp$NamePathProcessReadWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1995088466-0
                                                                                                                      • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction ID: f718f427be36361d75953774a1f7d46c56e3500d5ea13527a7314fc48a79ac1e
                                                                                                                      • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction Fuzzy Hash: D121D2B1545306BFE7215A20CC8EFFF3A2DEF95B10F000119FA4A99081D7B1AA15C6B6
                                                                                                                      APIs
                                                                                                                      • GetTempFileNameA.KERNEL32(?,7FE327A3,00000000,?), ref: 7FE327A8
                                                                                                                      • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE327A3,00000000,?), ref: 7FE327C3
                                                                                                                      • InternetReadFile.WININET(?,?,00000104), ref: 7FE327DD
                                                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE327A3,00000000,?), ref: 7FE327F3
                                                                                                                      • CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE327A3,00000000,?), ref: 7FE327FF
                                                                                                                      • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE327A3), ref: 7FE32823
                                                                                                                      • InternetCloseHandle.WININET(?), ref: 7FE32833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 7FE3283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$Create$NameProcessReadTempWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3452404049-0
                                                                                                                      • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction ID: 3bd9faa3a5304dd3e56ad62dc96b59a222f247842b0644106e5356e74212cdb4
                                                                                                                      • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction Fuzzy Hash: 7B116DB1510606BBEB250B20CC4EFFB7A2DFF85B14F404519FA4699080DBF5AA5196A8
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(03C1FBC4), ref: 00AD113D
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AD11D6), ref: 00AD1148
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1710796536.0000000000AD0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_ad0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressHandleModuleProc
                                                                                                                      • String ID: .DLL
                                                                                                                      • API String ID: 1646373207-899428287
                                                                                                                      • Opcode ID: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction ID: e751a7863ae893c14071b79070a00b5d658e8c5c6f3461a838edd442ab3669e2
                                                                                                                      • Opcode Fuzzy Hash: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction Fuzzy Hash: FC019270607005FADF659F6CC949AAA3B7DFF04355F10421AFA1B8B36AC7708E808695
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(03C1FBC4), ref: 7FE3113D
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE311D6), ref: 7FE31148
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000006.00000002.1712925890.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_6_2_7fe30000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressHandleModuleProc
                                                                                                                      • String ID: .DLL
                                                                                                                      • API String ID: 1646373207-899428287
                                                                                                                      • Opcode ID: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction ID: 53e3f59e3ca93c8d7ab4e5012bd1743a21eb7cc43ac6dec3ec0dbf52940c216a
                                                                                                                      • Opcode Fuzzy Hash: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction Fuzzy Hash: E001D634E07104EACB528E38C84DBDE3B7DFF44265F80411DD91A8F159C7789A40CBA5

                                                                                                                      Execution Graph

                                                                                                                      Execution Coverage:0.4%
                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                      Signature Coverage:0%
                                                                                                                      Total number of Nodes:353
                                                                                                                      Total number of Limit Nodes:2
                                                                                                                      execution_graph 3440 7fe42665 3442 7fe4266b CreateThread CloseHandle 3440->3442 3443 7fe43c38 3442->3443 3445 7fe43c3d 3443->3445 3446 7fe43ca9 3445->3446 3449 7fe43c5b GetWindowsDirectoryA 3445->3449 3500 7fe4252f NtOpenSection 3446->3500 3448 7fe43cae 3451 7fe43cb5 3448->3451 3452 7fe43cfb GetSystemDirectoryA 3448->3452 3454 7fe43d26 3449->3454 3501 7fe43cc2 GetModuleHandleA 3451->3501 3545 7fe43d1f lstrcat 3452->3545 3587 7fe43d36 LoadLibraryA 3454->3587 3500->3448 3502 7fe43cde 3501->3502 3503 7fe43ccc 3501->3503 3628 7fe43cf0 GetModuleHandleA 3502->3628 3505 7fe43cd4 GetProcAddress 3503->3505 3505->3502 3546 7fe43d26 3545->3546 3547 7fe43d36 151 API calls 3546->3547 3548 7fe43d2b GetProcAddress LoadLibraryA 3547->3548 3550 7fe410ce 2 API calls 3548->3550 3551 7fe43d7d 3550->3551 3552 7fe43d92 GetTickCount 3551->3552 3553 7fe43daa 3552->3553 3554 7fe43e47 GetVolumeInformationA 3553->3554 3555 7fe43e7a 3554->3555 3556 7fe43f25 3555->3556 3557 7fe43eb5 96 API calls 3555->3557 3558 7fe43f31 CreateThread CloseHandle 3556->3558 3559 7fe43f4f 3556->3559 3560 7fe43ea9 3557->3560 3558->3559 3561 7fe43f60 43 API calls 3559->3561 3560->3556 3563 7fe43eca GetModuleFileNameA wsprintfA 3560->3563 3562 7fe43f54 3561->3562 3564 7fe410ce 2 API calls 3562->3564 3566 7fe43f14 3563->3566 3565 7fe43f7e 3564->3565 3567 7fe43f8f 23 API calls 3565->3567 3566->3556 3569 7fe43405 5 API calls 3566->3569 3568 7fe43f83 3567->3568 3570 7fe43fd3 CreateThread CloseHandle 3568->3570 3571 7fe43ffa CreateEventA 3568->3571 3569->3556 3570->3571 3584 7fe44012 3571->3584 3572 7fe44065 gethostbyname 3572->3584 3573 7fe44056 lstrlen 3573->3572 3573->3573 3574 7fe44081 socket 3576 7fe440a6 connect 3574->3576 3574->3584 3575 7fe44320 RtlExitUserThread 3578 7fe442b7 closesocket 3576->3578 3576->3584 3577 7fe442d0 SetEvent 3577->3584 3578->3584 3579 7fe442f2 Sleep ResetEvent 3579->3584 3580 7fe440ef GetVersionExA 3580->3584 3581 7fe44172 wsprintfA 3581->3584 3582 7fe441a7 CreateThread CloseHandle 3582->3584 3583 7fe441f6 GetTickCount 3583->3584 3584->3572 3584->3573 3584->3574 3584->3575 3584->3577 3584->3578 3584->3579 3584->3580 3584->3581 3584->3582 3584->3583 3585 7fe44288 Sleep 3584->3585 3585->3584 3586 7fe44294 GetTickCount 3585->3586 3586->3584 3790 7fe43d4b GetProcAddress LoadLibraryA 3587->3790 3671 7fe426d4 3628->3671 3631 7fe43d1f 179 API calls 3632 7fe43d12 GetProcAddress LoadLibraryA 3631->3632 3673 7fe410ce 3632->3673 3635 7fe43d7d 3636 7fe43d92 GetTickCount 3635->3636 3637 7fe43daa 3636->3637 3638 7fe43e47 GetVolumeInformationA 3637->3638 3639 7fe43e7a 3638->3639 3640 7fe43f25 3639->3640 3677 7fe43eb5 LoadLibraryA 3639->3677 3642 7fe43f31 CreateThread CloseHandle 3640->3642 3643 7fe43f4f 3640->3643 3642->3643 3709 7fe43f60 LoadLibraryA 3643->3709 3672 7fe426c8 GetSystemDirectoryA 3671->3672 3672->3631 3675 7fe410db 3673->3675 3674 7fe4115c 3674->3635 3675->3673 3675->3674 3676 7fe41133 GetModuleHandleA GetProcAddress 3675->3676 3676->3675 3731 7fe43ecc GetProcAddress GetModuleFileNameA wsprintfA 3677->3731 3710 7fe43f7e 3709->3710 3711 7fe410ce 2 API calls 3709->3711 3712 7fe43f8f 23 API calls 3710->3712 3711->3710 3713 7fe43f83 3712->3713 3714 7fe43fd3 CreateThread CloseHandle 3713->3714 3715 7fe43ffa CreateEventA 3713->3715 3714->3715 3725 7fe44012 3715->3725 3716 7fe44065 gethostbyname 3716->3725 3717 7fe44056 lstrlen 3717->3716 3717->3717 3718 7fe44081 socket 3720 7fe440a6 connect 3718->3720 3718->3725 3719 7fe44320 RtlExitUserThread 3722 7fe442b7 closesocket 3720->3722 3720->3725 3721 7fe442d0 SetEvent 3721->3725 3722->3725 3723 7fe442f2 Sleep ResetEvent 3723->3725 3724 7fe440ef GetVersionExA 3724->3725 3725->3716 3725->3717 3725->3718 3725->3719 3725->3721 3725->3722 3725->3723 3725->3724 3726 7fe44172 wsprintfA 3725->3726 3727 7fe441a7 CreateThread CloseHandle 3725->3727 3728 7fe441f6 GetTickCount 3725->3728 3729 7fe44288 Sleep 3725->3729 3726->3725 3727->3725 3728->3725 3729->3725 3730 7fe44294 GetTickCount 3729->3730 3730->3725 3732 7fe43f14 3731->3732 3733 7fe43f25 3732->3733 3760 7fe43405 3732->3760 3735 7fe43f31 CreateThread CloseHandle 3733->3735 3736 7fe43f4f 3733->3736 3735->3736 3737 7fe43f60 43 API calls 3736->3737 3738 7fe43f54 3737->3738 3739 7fe410ce 2 API calls 3738->3739 3740 7fe43f7e 3739->3740 3769 7fe43f8f LoadLibraryA 3740->3769 3761 7fe4343b 3760->3761 3761->3761 3762 7fe43440 NtOpenSection 3761->3762 3763 7fe4344e 3762->3763 3764 7fe4345f NtQuerySystemInformation 3763->3764 3768 7fe435f3 3763->3768 3765 7fe4346f MapViewOfFile CloseHandle 3764->3765 3767 7fe434b0 3765->3767 3765->3768 3766 7fe434b7 UnmapViewOfFile 3766->3768 3767->3766 3767->3768 3768->3733 3770 7fe44320 RtlExitUserThread 3769->3770 3771 7fe43f9d 3769->3771 3772 7fe410ce 2 API calls 3771->3772 3773 7fe43fb5 3772->3773 3773->3770 3774 7fe43fc2 WSAStartup CreateThread CloseHandle 3773->3774 3775 7fe43ffa CreateEventA 3774->3775 3787 7fe44012 3775->3787 3776 7fe44065 gethostbyname 3776->3787 3777 7fe44056 lstrlen 3777->3776 3777->3777 3778 7fe44081 socket 3779 7fe440a6 connect 3778->3779 3778->3787 3781 7fe442b7 closesocket 3779->3781 3779->3787 3780 7fe442d0 SetEvent 3780->3787 3781->3787 3782 7fe442f2 Sleep ResetEvent 3782->3787 3783 7fe440ef GetVersionExA 3783->3787 3784 7fe44172 wsprintfA 3784->3787 3785 7fe441a7 CreateThread CloseHandle 3785->3787 3786 7fe441f6 GetTickCount 3786->3787 3787->3770 3787->3776 3787->3777 3787->3778 3787->3780 3787->3781 3787->3782 3787->3783 3787->3784 3787->3785 3787->3786 3788 7fe44288 Sleep 3787->3788 3788->3787 3789 7fe44294 GetTickCount 3788->3789 3789->3787 3791 7fe43d7d 3790->3791 3792 7fe410ce 2 API calls 3790->3792 3793 7fe43d92 GetTickCount 3791->3793 3792->3791 3794 7fe43daa 3793->3794 3795 7fe43e47 GetVolumeInformationA 3794->3795 3796 7fe43e7a 3795->3796 3797 7fe43f25 3796->3797 3798 7fe43eb5 96 API calls 3796->3798 3799 7fe43f31 CreateThread CloseHandle 3797->3799 3800 7fe43f4f 3797->3800 3801 7fe43ea9 3798->3801 3799->3800 3802 7fe43f60 43 API calls 3800->3802 3801->3797 3804 7fe43eca GetModuleFileNameA wsprintfA 3801->3804 3803 7fe43f54 3802->3803 3805 7fe410ce 2 API calls 3803->3805 3807 7fe43f14 3804->3807 3806 7fe43f7e 3805->3806 3808 7fe43f8f 23 API calls 3806->3808 3807->3797 3810 7fe43405 5 API calls 3807->3810 3809 7fe43f83 3808->3809 3811 7fe43fd3 CreateThread CloseHandle 3809->3811 3812 7fe43ffa CreateEventA 3809->3812 3810->3797 3811->3812 3825 7fe44012 3812->3825 3813 7fe44065 gethostbyname 3813->3825 3814 7fe44056 lstrlen 3814->3813 3814->3814 3815 7fe44081 socket 3817 7fe440a6 connect 3815->3817 3815->3825 3816 7fe44320 RtlExitUserThread 3819 7fe442b7 closesocket 3817->3819 3817->3825 3818 7fe442d0 SetEvent 3818->3825 3819->3825 3820 7fe442f2 Sleep ResetEvent 3820->3825 3821 7fe440ef GetVersionExA 3821->3825 3822 7fe44172 wsprintfA 3822->3825 3823 7fe441a7 CreateThread CloseHandle 3823->3825 3824 7fe441f6 GetTickCount 3824->3825 3825->3813 3825->3814 3825->3815 3825->3816 3825->3818 3825->3819 3825->3820 3825->3821 3825->3822 3825->3823 3825->3824 3826 7fe44288 Sleep 3825->3826 3826->3825 3827 7fe44294 GetTickCount 3826->3827 3827->3825 3828 7fe433e0 3829 7fe433e5 3828->3829 3830 7fe4344e 3828->3830 3831 7fe4346f MapViewOfFile CloseHandle 3829->3831 3833 7fe43440 NtOpenSection 3829->3833 3832 7fe4345f NtQuerySystemInformation 3830->3832 3836 7fe435f3 3830->3836 3835 7fe434b0 3831->3835 3831->3836 3832->3831 3833->3830 3834 7fe434b7 UnmapViewOfFile 3834->3836 3835->3834 3835->3836 3942 7fe46620 3943 7fe46647 5 API calls 3942->3943 3944 7fe4662a 3943->3944 3961 7fe40000 3962 7fe40004 3961->3962 3963 7fe400a1 3962->3963 3965 7fe4025e 3962->3965 3969 7fe40105 3965->3969 3968 7fe40278 3968->3963 3970 7fe40116 GetPEB 3969->3970 3970->3968 3837 7fe42762 3839 7fe42768 3837->3839 3840 7fe42780 GetTempPathA 3839->3840 3841 7fe42839 InternetCloseHandle 3839->3841 3849 7fe427a7 GetTempFileNameA CreateFileA 3840->3849 3843 7fe427a3 CreateFileA 3844 7fe427ce InternetReadFile 3843->3844 3845 7fe42829 InternetCloseHandle 3843->3845 3846 7fe427fe CloseHandle CreateProcessA 3844->3846 3847 7fe427e8 3844->3847 3845->3841 3846->3845 3847->3846 3848 7fe427ea WriteFile 3847->3848 3848->3844 3848->3846 3850 7fe427ce InternetReadFile 3849->3850 3851 7fe42829 InternetCloseHandle 3849->3851 3852 7fe427fe CloseHandle CreateProcessA 3850->3852 3853 7fe427e8 3850->3853 3854 7fe42839 InternetCloseHandle 3851->3854 3852->3851 3853->3852 3855 7fe427ea WriteFile 3853->3855 3854->3843 3855->3850 3855->3852 3945 7fe41422 LookupPrivilegeValueA NtAdjustPrivilegesToken 3946 7fe443ad 3947 7fe443b9 3946->3947 3950 7fe443dd 3947->3950 3949 7fe443c4 3953 7fe4144a LookupPrivilegeValueA NtAdjustPrivilegesToken 3950->3953 3952 7fe443e3 3952->3949 3953->3952 3938 7fe40fcf 3940 7fe410a0 3938->3940 3939 7fe4115c 3940->3939 3941 7fe41133 GetModuleHandleA GetProcAddress 3940->3941 3941->3940 3971 7fe43888 3973 7fe4388e GetSystemTime 3971->3973 3981 7fe438d2 3973->3981 3974 7fe4390c Sleep 3974->3981 3975 7fe43924 InternetGetConnectedState 3975->3981 3976 7fe43a32 3977 7fe43954 gethostbyname 3978 7fe4397a socket 3977->3978 3977->3981 3979 7fe43990 ioctlsocket connect Sleep 3978->3979 3978->3981 3979->3981 3980 7fe43a1f closesocket 3980->3981 3981->3974 3981->3975 3981->3976 3981->3977 3981->3980 3425 7fe44c6b 3428 7fe44c9e 3425->3428 3429 7fe44caa 3428->3429 3436 7fe44499 3429->3436 3431 7fe44cb7 3432 7fe44499 CreateFileA 3431->3432 3435 7fe44d64 3431->3435 3433 7fe44d58 3432->3433 3434 7fe44499 CreateFileA 3433->3434 3433->3435 3434->3435 3437 7fe444a3 CreateFileA 3436->3437 3439 7fe444fc 3437->3439 3439->3431 3982 7fe41196 GetProcAddress 3856 7fe402fe 3857 7fe40415 3856->3857 3859 7fe4042d 3857->3859 3860 7fe410ce 2 API calls 3859->3860 3861 7fe4048f 3860->3861 3862 7fe404dd 3861->3862 3863 7fe404b0 GetModuleHandleA 3861->3863 3864 7fe404f8 GetVersion 3862->3864 3863->3862 3865 7fe4050f VirtualAlloc 3864->3865 3866 7fe405ca 3864->3866 3867 7fe405a9 CloseHandle 3865->3867 3872 7fe40532 3865->3872 3866->3867 3868 7fe405d3 SetProcessAffinityMask 3866->3868 3870 7fe405f2 GetModuleHandleA 3867->3870 3893 7fe405f2 GetModuleHandleA 3868->3893 3871 7fe410ce 2 API calls 3870->3871 3888 7fe405ec 3871->3888 3872->3867 3890 7fe405ba 3872->3890 3873 7fe406fc lstrcpyW 3912 7fe424ae lstrcpyW lstrlenW 3873->3912 3875 7fe40717 GetPEB lstrcpyW lstrcatW 3878 7fe424ae 3 API calls 3875->3878 3876 7fe4074c NtMapViewOfSection 3876->3867 3876->3888 3878->3888 3879 7fe40780 NtOpenProcessToken 3880 7fe407c5 CreateToolhelp32Snapshot Process32First 3879->3880 3879->3888 3880->3888 3881 7fe407eb Process32Next 3884 7fe40865 CloseHandle 3881->3884 3881->3888 3882 7fe42574 5 API calls 3882->3888 3884->3867 3885 7fe407fd OpenProcess 3885->3881 3885->3888 3886 7fe4085c CloseHandle 3886->3881 3887 7fe40834 CreateRemoteThread 3887->3886 3887->3888 3888->3867 3888->3873 3888->3875 3888->3876 3888->3879 3888->3880 3888->3881 3888->3882 3888->3885 3888->3886 3888->3887 3889 7fe405ba Sleep 3888->3889 3915 7fe407ac 3888->3915 3889->3886 3891 7fe405bf Sleep 3890->3891 3892 7fe405c9 3890->3892 3891->3890 3892->3867 3894 7fe410ce 2 API calls 3893->3894 3910 7fe4060e 3894->3910 3895 7fe405a9 CloseHandle 3895->3893 3896 7fe406fc lstrcpyW 3897 7fe424ae 3 API calls 3896->3897 3897->3910 3898 7fe40717 GetPEB lstrcpyW lstrcatW 3900 7fe424ae 3 API calls 3898->3900 3899 7fe4074c NtMapViewOfSection 3899->3895 3899->3910 3900->3910 3901 7fe40780 NtOpenProcessToken 3902 7fe407c5 CreateToolhelp32Snapshot Process32First 3901->3902 3901->3910 3902->3910 3903 7fe407eb Process32Next 3906 7fe40865 CloseHandle 3903->3906 3903->3910 3904 7fe42574 5 API calls 3904->3910 3905 7fe407ac 30 API calls 3905->3910 3906->3895 3907 7fe407fd OpenProcess 3907->3903 3907->3910 3908 7fe4085c CloseHandle 3908->3903 3909 7fe40834 CreateRemoteThread 3909->3908 3909->3910 3910->3895 3910->3896 3910->3898 3910->3899 3910->3901 3910->3902 3910->3903 3910->3904 3910->3905 3910->3907 3910->3908 3910->3909 3911 7fe405ba Sleep 3910->3911 3911->3908 3913 7fe469f1 3912->3913 3914 7fe424ea NtCreateSection 3913->3914 3914->3888 3937 7fe4144a LookupPrivilegeValueA NtAdjustPrivilegesToken 3915->3937 3917 7fe407b2 FreeLibrary CloseHandle 3918 7fe407c5 CreateToolhelp32Snapshot Process32First 3917->3918 3927 7fe4060e 3918->3927 3919 7fe407eb Process32Next 3921 7fe40865 CloseHandle 3919->3921 3919->3927 3920 7fe42574 5 API calls 3920->3927 3922 7fe405a9 CloseHandle 3921->3922 3926 7fe405f2 GetModuleHandleA 3922->3926 3923 7fe407fd OpenProcess 3923->3919 3923->3927 3924 7fe4085c CloseHandle 3924->3919 3925 7fe40834 CreateRemoteThread 3925->3924 3925->3927 3928 7fe410ce 2 API calls 3926->3928 3927->3918 3927->3919 3927->3920 3927->3922 3927->3923 3927->3924 3927->3925 3929 7fe405ba Sleep 3927->3929 3930 7fe406fc lstrcpyW 3927->3930 3932 7fe40717 GetPEB lstrcpyW lstrcatW 3927->3932 3933 7fe4074c NtMapViewOfSection 3927->3933 3935 7fe40780 NtOpenProcessToken 3927->3935 3936 7fe407ac 13 API calls 3927->3936 3928->3927 3929->3924 3931 7fe424ae 3 API calls 3930->3931 3931->3927 3934 7fe424ae 3 API calls 3932->3934 3933->3922 3933->3927 3934->3927 3935->3918 3935->3927 3936->3927 3937->3917 3983 7fe43399 3985 7fe433a2 3983->3985 3986 7fe433a9 Sleep 3985->3986 3986->3986 3987 7fe43819 3989 7fe4381f WaitForSingleObject 3987->3989 3990 7fe43845 3989->3990 3991 7fe4383b closesocket 3989->3991 3991->3990 3388 7fe4663a 3391 7fe46647 3388->3391 3392 7fe46652 3391->3392 3393 7fe46644 3391->3393 3395 7fe46658 3392->3395 3398 7fe42574 3395->3398 3417 7fe4252f NtOpenSection 3398->3417 3400 7fe4257c 3401 7fe42661 3400->3401 3402 7fe42582 NtMapViewOfSection CloseHandle 3400->3402 3401->3393 3402->3401 3404 7fe425ba 3402->3404 3403 7fe425ef 3419 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 3403->3419 3404->3403 3418 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 3404->3418 3407 7fe42600 3420 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 3407->3420 3409 7fe42611 3421 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 3409->3421 3411 7fe42622 3412 7fe42637 3411->3412 3422 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 3411->3422 3414 7fe4264c 3412->3414 3423 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 3412->3423 3414->3401 3424 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 3414->3424 3417->3400 3418->3403 3419->3407 3420->3409 3421->3411 3422->3412 3423->3414 3424->3401 3957 7fe4443b 3960 7fe4144a LookupPrivilegeValueA NtAdjustPrivilegesToken 3957->3960 3959 7fe44441 3960->3959

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 0 7fe44499-7fe444a1 1 7fe444a3-7fe444ad 0->1 2 7fe444c8-7fe444f6 CreateFileA 0->2 1->2 7 7fe444af-7fe444c0 1->7 8 7fe444fc-7fe44504 2->8 7->2 12 7fe444c2 7->12 10 7fe44506-7fe4451f 8->10 11 7fe44527-7fe4454d 8->11 10->11 15 7fe44521 10->15 17 7fe4454f-7fe44556 11->17 18 7fe44558-7fe44582 11->18 12->2 15->11 17->18 22 7fe44584-7fe4458b 18->22 23 7fe4458d-7fe445ae 18->23 22->23
                                                                                                                      APIs
                                                                                                                      • CreateFileA.KERNELBASE(?,C0000000,00000001,00000000,00000003,00000000,00000000,?,65676E61,?,?,7FE44406,?,7FE443E8,?,7FE443C4), ref: 7FE444ED
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateFile
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 823142352-0
                                                                                                                      • Opcode ID: a597af1445ea8736db27a55b35799f807b5cdfd84ba473e7882835a9cfdd7254
                                                                                                                      • Instruction ID: 7546c9a9d357b7e1dadf9586052fd295a6a3be759e7d42c7efdb4b51d27ad5e1
                                                                                                                      • Opcode Fuzzy Hash: a597af1445ea8736db27a55b35799f807b5cdfd84ba473e7882835a9cfdd7254
                                                                                                                      • Instruction Fuzzy Hash: 22216070305309BFEF218E619C45BBA366CAF00219F51122DFE2A9E094D7F4AF058728

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 30 7fe43c3d-7fe43c59 31 7fe43ca9-7fe43cb3 call 7fe4252f 30->31 32 7fe43c5b-7fe43c63 30->32 40 7fe43cb5-7fe43cce call 7fe43cc2 31->40 41 7fe43cfb-7fe43d43 GetSystemDirectoryA call 7fe43d1f 31->41 33 7fe43c64-7fe43c67 32->33 35 7fe43c93 33->35 36 7fe43c69-7fe43c6e 33->36 35->33 39 7fe43c95-7fe43d43 GetWindowsDirectoryA call 7fe43d36 35->39 36->35 38 7fe43c70-7fe43c91 36->38 38->35 49 7fe43d45-7fe43dc0 GetProcAddress LoadLibraryA call 7fe410ce call 7fe401cb GetTickCount call 7fe43b76 39->49 50 7fe43cd4-7fe43cdc GetProcAddress 40->50 51 7fe43ccf call 7fe426d4 40->51 41->49 62 7fe43dc2 49->62 63 7fe43dc8-7fe43dcd call 7fe43b76 49->63 52 7fe43ce0-7fe43d43 call 7fe43cf0 50->52 53 7fe43cde 50->53 51->50 52->49 53->52 62->63 66 7fe43dcf-7fe43de6 63->66 67 7fe43de8-7fe43df8 call 7fe463a0 call 7fe4273c 66->67 72 7fe43dfe-7fe43e1a call 7fe463a0 67->72 73 7fe43dfa-7fe43dfc 67->73 74 7fe43e1b-7fe43e1c 72->74 73->74 74->67 77 7fe43e1e-7fe43e24 74->77 77->66 78 7fe43e26-7fe43e30 call 7fe4273c 77->78 81 7fe43e32-7fe43e3a call 7fe42750 78->81 82 7fe43e3f-7fe43e78 call 7fe4273c GetVolumeInformationA 78->82 81->82 86 7fe43e82-7fe43e88 82->86 87 7fe43e7a-7fe43e80 82->87 88 7fe43e91-7fe43e9e 86->88 89 7fe43e8a 86->89 87->88 90 7fe43ea4-7fe43ec8 call 7fe43eb5 88->90 91 7fe43f25 88->91 89->88 92 7fe43f2f 90->92 100 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 90->100 91->92 94 7fe43f31-7fe43f49 CreateThread CloseHandle 92->94 95 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 92->95 94->95 109 7fe43fd3-7fe43ff8 CreateThread CloseHandle 95->109 110 7fe43ffa-7fe4400b CreateEventA 95->110 100->91 105 7fe43f20 call 7fe43405 100->105 105->91 109->110 111 7fe44012-7fe4402a call 7fe437fa 110->111 114 7fe44031-7fe44044 call 7fe43b90 111->114 115 7fe4402c-7fe4402f 111->115 123 7fe442be-7fe442c5 114->123 124 7fe4404a 114->124 115->114 116 7fe4404c-7fe44054 115->116 119 7fe44065-7fe4406e gethostbyname 116->119 120 7fe44056-7fe44063 lstrlen 116->120 121 7fe44074-7fe4407b 119->121 122 7fe44315-7fe4431b 119->122 120->119 120->120 125 7fe44081-7fe440a0 socket 121->125 122->111 126 7fe442c7-7fe442ce 123->126 127 7fe44320-7fe44322 RtlExitUserThread 123->127 124->125 125->123 128 7fe440a6-7fe440b9 connect 125->128 129 7fe442d0-7fe442dc SetEvent 126->129 130 7fe442e2-7fe442e9 126->130 131 7fe442b7-7fe442b8 closesocket 128->131 132 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 128->132 129->130 133 7fe442f2-7fe44310 Sleep ResetEvent 130->133 134 7fe442eb 130->134 131->123 145 7fe44195-7fe441a5 call 7fe43358 132->145 146 7fe44170 132->146 133->111 134->133 152 7fe441a7-7fe441bd CreateThread CloseHandle 145->152 153 7fe441c3-7fe441ca 145->153 147 7fe44192-7fe44194 146->147 148 7fe44172-7fe4418c wsprintfA 146->148 147->145 148->147 150 7fe4418e 148->150 150->147 152->153 154 7fe441d0-7fe441eb 153->154 156 7fe44210-7fe44214 154->156 157 7fe441ed-7fe441f4 154->157 156->131 158 7fe4421a-7fe4421c 156->158 157->156 159 7fe441f6-7fe44207 GetTickCount 157->159 160 7fe4421e-7fe44236 158->160 159->156 161 7fe44209 159->161 162 7fe44238 160->162 163 7fe4423b-7fe44243 160->163 161->156 162->163 163->160 164 7fe44245 163->164 165 7fe4424b-7fe4424f 164->165 166 7fe44261-7fe44263 165->166 167 7fe44251-7fe44258 call 7fe42f08 165->167 169 7fe44265-7fe4426f 166->169 167->131 172 7fe4425a 167->172 171 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 169->171 171->154 178 7fe44288-7fe44292 Sleep 171->178 172->169 175 7fe4425c-7fe4425f 172->175 175->165 178->171 179 7fe44294-7fe442a5 GetTickCount 178->179 179->154 180 7fe442ab-7fe442b2 179->180 180->131 180->154
                                                                                                                      APIs
                                                                                                                      • GetWindowsDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 7FE43CA1
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 7FE43CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 1749273276-1098094878
                                                                                                                      • Opcode ID: 52851077f5d53f69d58aa784cc1854b2e94257a57670201441823f58a38ae1fa
                                                                                                                      • Instruction ID: a9c893c36cba37f36994ff1ade31cd64da17a3bb77e2321a458bf3f53f95c566
                                                                                                                      • Opcode Fuzzy Hash: 52851077f5d53f69d58aa784cc1854b2e94257a57670201441823f58a38ae1fa
                                                                                                                      • Instruction Fuzzy Hash: 9102E071509358BFEB229F209C0ABEA7BACEF41304F00551DFC4A9E081D6F46F459BA6

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 181 7fe43cc2-7fe43cca GetModuleHandleA 182 7fe43ce0-7fe43dc0 call 7fe43cf0 GetProcAddress LoadLibraryA call 7fe410ce call 7fe401cb GetTickCount call 7fe43b76 181->182 183 7fe43ccc-7fe43cdc call 7fe426d4 GetProcAddress 181->183 196 7fe43dc2 182->196 197 7fe43dc8-7fe43dcd call 7fe43b76 182->197 183->182 188 7fe43cde 183->188 188->182 196->197 200 7fe43dcf-7fe43de6 197->200 201 7fe43de8-7fe43df8 call 7fe463a0 call 7fe4273c 200->201 206 7fe43dfe-7fe43e1a call 7fe463a0 201->206 207 7fe43dfa-7fe43dfc 201->207 208 7fe43e1b-7fe43e1c 206->208 207->208 208->201 211 7fe43e1e-7fe43e24 208->211 211->200 212 7fe43e26-7fe43e30 call 7fe4273c 211->212 215 7fe43e32-7fe43e3a call 7fe42750 212->215 216 7fe43e3f-7fe43e78 call 7fe4273c GetVolumeInformationA 212->216 215->216 220 7fe43e82-7fe43e88 216->220 221 7fe43e7a-7fe43e80 216->221 222 7fe43e91-7fe43e9e 220->222 223 7fe43e8a 220->223 221->222 224 7fe43ea4-7fe43ec8 call 7fe43eb5 222->224 225 7fe43f25 222->225 223->222 226 7fe43f2f 224->226 234 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 224->234 225->226 228 7fe43f31-7fe43f49 CreateThread CloseHandle 226->228 229 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 226->229 228->229 243 7fe43fd3-7fe43ff8 CreateThread CloseHandle 229->243 244 7fe43ffa-7fe4400b CreateEventA 229->244 234->225 239 7fe43f20 call 7fe43405 234->239 239->225 243->244 245 7fe44012-7fe4402a call 7fe437fa 244->245 248 7fe44031-7fe44044 call 7fe43b90 245->248 249 7fe4402c-7fe4402f 245->249 257 7fe442be-7fe442c5 248->257 258 7fe4404a 248->258 249->248 250 7fe4404c-7fe44054 249->250 253 7fe44065-7fe4406e gethostbyname 250->253 254 7fe44056-7fe44063 lstrlen 250->254 255 7fe44074-7fe4407b 253->255 256 7fe44315-7fe4431b 253->256 254->253 254->254 259 7fe44081-7fe440a0 socket 255->259 256->245 260 7fe442c7-7fe442ce 257->260 261 7fe44320-7fe44322 RtlExitUserThread 257->261 258->259 259->257 262 7fe440a6-7fe440b9 connect 259->262 263 7fe442d0-7fe442dc SetEvent 260->263 264 7fe442e2-7fe442e9 260->264 265 7fe442b7-7fe442b8 closesocket 262->265 266 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 262->266 263->264 267 7fe442f2-7fe44310 Sleep ResetEvent 264->267 268 7fe442eb 264->268 265->257 279 7fe44195-7fe441a5 call 7fe43358 266->279 280 7fe44170 266->280 267->245 268->267 286 7fe441a7-7fe441bd CreateThread CloseHandle 279->286 287 7fe441c3-7fe441ca 279->287 281 7fe44192-7fe44194 280->281 282 7fe44172-7fe4418c wsprintfA 280->282 281->279 282->281 284 7fe4418e 282->284 284->281 286->287 288 7fe441d0-7fe441eb 287->288 290 7fe44210-7fe44214 288->290 291 7fe441ed-7fe441f4 288->291 290->265 292 7fe4421a-7fe4421c 290->292 291->290 293 7fe441f6-7fe44207 GetTickCount 291->293 294 7fe4421e-7fe44236 292->294 293->290 295 7fe44209 293->295 296 7fe44238 294->296 297 7fe4423b-7fe44243 294->297 295->290 296->297 297->294 298 7fe44245 297->298 299 7fe4424b-7fe4424f 298->299 300 7fe44261-7fe44263 299->300 301 7fe44251-7fe44258 call 7fe42f08 299->301 303 7fe44265-7fe4426f 300->303 301->265 306 7fe4425a 301->306 305 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 303->305 305->288 312 7fe44288-7fe44292 Sleep 305->312 306->303 309 7fe4425c-7fe4425f 306->309 309->299 312->305 313 7fe44294-7fe442a5 GetTickCount 312->313 313->288 314 7fe442ab-7fe442b2 313->314 314->265 314->288
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE43CBA), ref: 7FE43CC2
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 7FE43CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2837544101-1098094878
                                                                                                                      • Opcode ID: 11790b7d93145b92564ec9d4155d1899de06e17603de67d5beaef9747acc1a7f
                                                                                                                      • Instruction ID: c453ebe4c61d0623fc47b3a56a20a6bb1634521f5f2c168e6baeb2cb6925c9c1
                                                                                                                      • Opcode Fuzzy Hash: 11790b7d93145b92564ec9d4155d1899de06e17603de67d5beaef9747acc1a7f
                                                                                                                      • Instruction Fuzzy Hash: CEE1F171509358BFEB229F209C4ABEA7BACEF41304F00555DFC4A8E081D6F46F059BA6

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 315 7fe43cf0-7fe43dc0 GetModuleHandleA call 7fe426d4 GetSystemDirectoryA call 7fe43d1f GetProcAddress LoadLibraryA call 7fe410ce call 7fe401cb GetTickCount call 7fe43b76 327 7fe43dc2 315->327 328 7fe43dc8-7fe43dcd call 7fe43b76 315->328 327->328 331 7fe43dcf-7fe43de6 328->331 332 7fe43de8-7fe43df8 call 7fe463a0 call 7fe4273c 331->332 337 7fe43dfe-7fe43e1a call 7fe463a0 332->337 338 7fe43dfa-7fe43dfc 332->338 339 7fe43e1b-7fe43e1c 337->339 338->339 339->332 342 7fe43e1e-7fe43e24 339->342 342->331 343 7fe43e26-7fe43e30 call 7fe4273c 342->343 346 7fe43e32-7fe43e3a call 7fe42750 343->346 347 7fe43e3f-7fe43e78 call 7fe4273c GetVolumeInformationA 343->347 346->347 351 7fe43e82-7fe43e88 347->351 352 7fe43e7a-7fe43e80 347->352 353 7fe43e91-7fe43e9e 351->353 354 7fe43e8a 351->354 352->353 355 7fe43ea4-7fe43ec8 call 7fe43eb5 353->355 356 7fe43f25 353->356 354->353 357 7fe43f2f 355->357 365 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 355->365 356->357 359 7fe43f31-7fe43f49 CreateThread CloseHandle 357->359 360 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 357->360 359->360 374 7fe43fd3-7fe43ff8 CreateThread CloseHandle 360->374 375 7fe43ffa-7fe4400b CreateEventA 360->375 365->356 370 7fe43f20 call 7fe43405 365->370 370->356 374->375 376 7fe44012-7fe4402a call 7fe437fa 375->376 379 7fe44031-7fe44044 call 7fe43b90 376->379 380 7fe4402c-7fe4402f 376->380 388 7fe442be-7fe442c5 379->388 389 7fe4404a 379->389 380->379 381 7fe4404c-7fe44054 380->381 384 7fe44065-7fe4406e gethostbyname 381->384 385 7fe44056-7fe44063 lstrlen 381->385 386 7fe44074-7fe4407b 384->386 387 7fe44315-7fe4431b 384->387 385->384 385->385 390 7fe44081-7fe440a0 socket 386->390 387->376 391 7fe442c7-7fe442ce 388->391 392 7fe44320-7fe44322 RtlExitUserThread 388->392 389->390 390->388 393 7fe440a6-7fe440b9 connect 390->393 394 7fe442d0-7fe442dc SetEvent 391->394 395 7fe442e2-7fe442e9 391->395 396 7fe442b7-7fe442b8 closesocket 393->396 397 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 393->397 394->395 398 7fe442f2-7fe44310 Sleep ResetEvent 395->398 399 7fe442eb 395->399 396->388 410 7fe44195-7fe441a5 call 7fe43358 397->410 411 7fe44170 397->411 398->376 399->398 417 7fe441a7-7fe441bd CreateThread CloseHandle 410->417 418 7fe441c3-7fe441ca 410->418 412 7fe44192-7fe44194 411->412 413 7fe44172-7fe4418c wsprintfA 411->413 412->410 413->412 415 7fe4418e 413->415 415->412 417->418 419 7fe441d0-7fe441eb 418->419 421 7fe44210-7fe44214 419->421 422 7fe441ed-7fe441f4 419->422 421->396 423 7fe4421a-7fe4421c 421->423 422->421 424 7fe441f6-7fe44207 GetTickCount 422->424 425 7fe4421e-7fe44236 423->425 424->421 426 7fe44209 424->426 427 7fe44238 425->427 428 7fe4423b-7fe44243 425->428 426->421 427->428 428->425 429 7fe44245 428->429 430 7fe4424b-7fe4424f 429->430 431 7fe44261-7fe44263 430->431 432 7fe44251-7fe44258 call 7fe42f08 430->432 434 7fe44265-7fe4426f 431->434 432->396 437 7fe4425a 432->437 436 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 434->436 436->419 443 7fe44288-7fe44292 Sleep 436->443 437->434 440 7fe4425c-7fe4425f 437->440 440->430 443->436 444 7fe44294-7fe442a5 GetTickCount 443->444 444->419 445 7fe442ab-7fe442b2 444->445 445->396 445->419
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE43CE5), ref: 7FE43CF0
                                                                                                                      • GetSystemDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 7FE43D07
                                                                                                                        • Part of subcall function 7FE43D1F: lstrcat.KERNEL32(020a00 . . :#73204497e +*,7FE43D12), ref: 7FE43D20
                                                                                                                        • Part of subcall function 7FE43D1F: GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                        • Part of subcall function 7FE43D1F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                        • Part of subcall function 7FE43D1F: GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                        • Part of subcall function 7FE43D1F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 215653160-1098094878
                                                                                                                      • Opcode ID: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                                                                                                      • Instruction ID: a575d1816f1fafdbe36b7d8d9a618c6fc80930f7c3831f5bc8b2ed9575ddbc2a
                                                                                                                      • Opcode Fuzzy Hash: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                                                                                                      • Instruction Fuzzy Hash: 23E1DF71509358BFEB229F209C0ABEA7BACEF42304F00655DFC4A9E081D6F46F459B65

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 446 7fe43d1f-7fe43dc0 lstrcat call 7fe43d36 GetProcAddress LoadLibraryA call 7fe410ce call 7fe401cb GetTickCount call 7fe43b76 457 7fe43dc2 446->457 458 7fe43dc8-7fe43dcd call 7fe43b76 446->458 457->458 461 7fe43dcf-7fe43de6 458->461 462 7fe43de8-7fe43df8 call 7fe463a0 call 7fe4273c 461->462 467 7fe43dfe-7fe43e1a call 7fe463a0 462->467 468 7fe43dfa-7fe43dfc 462->468 469 7fe43e1b-7fe43e1c 467->469 468->469 469->462 472 7fe43e1e-7fe43e24 469->472 472->461 473 7fe43e26-7fe43e30 call 7fe4273c 472->473 476 7fe43e32-7fe43e3a call 7fe42750 473->476 477 7fe43e3f-7fe43e78 call 7fe4273c GetVolumeInformationA 473->477 476->477 481 7fe43e82-7fe43e88 477->481 482 7fe43e7a-7fe43e80 477->482 483 7fe43e91-7fe43e9e 481->483 484 7fe43e8a 481->484 482->483 485 7fe43ea4-7fe43ec8 call 7fe43eb5 483->485 486 7fe43f25 483->486 484->483 487 7fe43f2f 485->487 495 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 485->495 486->487 489 7fe43f31-7fe43f49 CreateThread CloseHandle 487->489 490 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 487->490 489->490 504 7fe43fd3-7fe43ff8 CreateThread CloseHandle 490->504 505 7fe43ffa-7fe4400b CreateEventA 490->505 495->486 500 7fe43f20 call 7fe43405 495->500 500->486 504->505 506 7fe44012-7fe4402a call 7fe437fa 505->506 509 7fe44031-7fe44044 call 7fe43b90 506->509 510 7fe4402c-7fe4402f 506->510 518 7fe442be-7fe442c5 509->518 519 7fe4404a 509->519 510->509 511 7fe4404c-7fe44054 510->511 514 7fe44065-7fe4406e gethostbyname 511->514 515 7fe44056-7fe44063 lstrlen 511->515 516 7fe44074-7fe4407b 514->516 517 7fe44315-7fe4431b 514->517 515->514 515->515 520 7fe44081-7fe440a0 socket 516->520 517->506 521 7fe442c7-7fe442ce 518->521 522 7fe44320-7fe44322 RtlExitUserThread 518->522 519->520 520->518 523 7fe440a6-7fe440b9 connect 520->523 524 7fe442d0-7fe442dc SetEvent 521->524 525 7fe442e2-7fe442e9 521->525 526 7fe442b7-7fe442b8 closesocket 523->526 527 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 523->527 524->525 528 7fe442f2-7fe44310 Sleep ResetEvent 525->528 529 7fe442eb 525->529 526->518 540 7fe44195-7fe441a5 call 7fe43358 527->540 541 7fe44170 527->541 528->506 529->528 547 7fe441a7-7fe441bd CreateThread CloseHandle 540->547 548 7fe441c3-7fe441ca 540->548 542 7fe44192-7fe44194 541->542 543 7fe44172-7fe4418c wsprintfA 541->543 542->540 543->542 545 7fe4418e 543->545 545->542 547->548 549 7fe441d0-7fe441eb 548->549 551 7fe44210-7fe44214 549->551 552 7fe441ed-7fe441f4 549->552 551->526 553 7fe4421a-7fe4421c 551->553 552->551 554 7fe441f6-7fe44207 GetTickCount 552->554 555 7fe4421e-7fe44236 553->555 554->551 556 7fe44209 554->556 557 7fe44238 555->557 558 7fe4423b-7fe44243 555->558 556->551 557->558 558->555 559 7fe44245 558->559 560 7fe4424b-7fe4424f 559->560 561 7fe44261-7fe44263 560->561 562 7fe44251-7fe44258 call 7fe42f08 560->562 564 7fe44265-7fe4426f 561->564 562->526 567 7fe4425a 562->567 566 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 564->566 566->549 573 7fe44288-7fe44292 Sleep 566->573 567->564 570 7fe4425c-7fe4425f 567->570 570->560 573->566 574 7fe44294-7fe442a5 GetTickCount 573->574 574->549 575 7fe442ab-7fe442b2 574->575 575->526 575->549
                                                                                                                      APIs
                                                                                                                      • lstrcat.KERNEL32(020a00 . . :#73204497e +*,7FE43D12), ref: 7FE43D20
                                                                                                                        • Part of subcall function 7FE43D36: LoadLibraryA.KERNEL32(7FE43D2B), ref: 7FE43D36
                                                                                                                        • Part of subcall function 7FE43D36: GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                        • Part of subcall function 7FE43D36: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                        • Part of subcall function 7FE43D36: GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                        • Part of subcall function 7FE43D36: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2038497427-1098094878
                                                                                                                      • Opcode ID: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                                                                                                      • Instruction ID: 426a991c9d28a372a142f780a5599c1fe21c99d29c9374d1d361bc923b179bdc
                                                                                                                      • Opcode Fuzzy Hash: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                                                                                                      • Instruction Fuzzy Hash: 71E1ED71509358BFEB229F209C0ABEA7BACEF42304F00655DFC4A9E081D6F46F459B65

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 576 7fe43d36-7fe43dc0 LoadLibraryA call 7fe43d4b GetProcAddress LoadLibraryA call 7fe410ce call 7fe401cb GetTickCount call 7fe43b76 587 7fe43dc2 576->587 588 7fe43dc8-7fe43dcd call 7fe43b76 576->588 587->588 591 7fe43dcf-7fe43de6 588->591 592 7fe43de8-7fe43df8 call 7fe463a0 call 7fe4273c 591->592 597 7fe43dfe-7fe43e1a call 7fe463a0 592->597 598 7fe43dfa-7fe43dfc 592->598 599 7fe43e1b-7fe43e1c 597->599 598->599 599->592 602 7fe43e1e-7fe43e24 599->602 602->591 603 7fe43e26-7fe43e30 call 7fe4273c 602->603 606 7fe43e32-7fe43e3a call 7fe42750 603->606 607 7fe43e3f-7fe43e78 call 7fe4273c GetVolumeInformationA 603->607 606->607 611 7fe43e82-7fe43e88 607->611 612 7fe43e7a-7fe43e80 607->612 613 7fe43e91-7fe43e9e 611->613 614 7fe43e8a 611->614 612->613 615 7fe43ea4-7fe43ec8 call 7fe43eb5 613->615 616 7fe43f25 613->616 614->613 617 7fe43f2f 615->617 625 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 615->625 616->617 619 7fe43f31-7fe43f49 CreateThread CloseHandle 617->619 620 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 617->620 619->620 634 7fe43fd3-7fe43ff8 CreateThread CloseHandle 620->634 635 7fe43ffa-7fe4400b CreateEventA 620->635 625->616 630 7fe43f20 call 7fe43405 625->630 630->616 634->635 636 7fe44012-7fe4402a call 7fe437fa 635->636 639 7fe44031-7fe44044 call 7fe43b90 636->639 640 7fe4402c-7fe4402f 636->640 648 7fe442be-7fe442c5 639->648 649 7fe4404a 639->649 640->639 641 7fe4404c-7fe44054 640->641 644 7fe44065-7fe4406e gethostbyname 641->644 645 7fe44056-7fe44063 lstrlen 641->645 646 7fe44074-7fe4407b 644->646 647 7fe44315-7fe4431b 644->647 645->644 645->645 650 7fe44081-7fe440a0 socket 646->650 647->636 651 7fe442c7-7fe442ce 648->651 652 7fe44320-7fe44322 RtlExitUserThread 648->652 649->650 650->648 653 7fe440a6-7fe440b9 connect 650->653 654 7fe442d0-7fe442dc SetEvent 651->654 655 7fe442e2-7fe442e9 651->655 656 7fe442b7-7fe442b8 closesocket 653->656 657 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 653->657 654->655 658 7fe442f2-7fe44310 Sleep ResetEvent 655->658 659 7fe442eb 655->659 656->648 670 7fe44195-7fe441a5 call 7fe43358 657->670 671 7fe44170 657->671 658->636 659->658 677 7fe441a7-7fe441bd CreateThread CloseHandle 670->677 678 7fe441c3-7fe441ca 670->678 672 7fe44192-7fe44194 671->672 673 7fe44172-7fe4418c wsprintfA 671->673 672->670 673->672 675 7fe4418e 673->675 675->672 677->678 679 7fe441d0-7fe441eb 678->679 681 7fe44210-7fe44214 679->681 682 7fe441ed-7fe441f4 679->682 681->656 683 7fe4421a-7fe4421c 681->683 682->681 684 7fe441f6-7fe44207 GetTickCount 682->684 685 7fe4421e-7fe44236 683->685 684->681 686 7fe44209 684->686 687 7fe44238 685->687 688 7fe4423b-7fe44243 685->688 686->681 687->688 688->685 689 7fe44245 688->689 690 7fe4424b-7fe4424f 689->690 691 7fe44261-7fe44263 690->691 692 7fe44251-7fe44258 call 7fe42f08 690->692 694 7fe44265-7fe4426f 691->694 692->656 697 7fe4425a 692->697 696 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 694->696 696->679 703 7fe44288-7fe44292 Sleep 696->703 697->694 700 7fe4425c-7fe4425f 697->700 700->690 703->696 704 7fe44294-7fe442a5 GetTickCount 703->704 704->679 705 7fe442ab-7fe442b2 704->705 705->656 705->679
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43D2B), ref: 7FE43D36
                                                                                                                        • Part of subcall function 7FE43D4B: GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                        • Part of subcall function 7FE43D4B: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                        • Part of subcall function 7FE43D4B: GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                        • Part of subcall function 7FE43D4B: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 3734769084-1098094878
                                                                                                                      • Opcode ID: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                                                                                                      • Instruction ID: b6e5c684999b5124a360ce0b6569c1417190782f1e811f7b4d9ad18746e01973
                                                                                                                      • Opcode Fuzzy Hash: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                                                                                                      • Instruction Fuzzy Hash: 57D1DC71509358BFEB229F609C0ABEA7BACEF41304F00261DFC4A9E081D6F46F459B65

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 706 7fe43d4b-7fe43d72 GetProcAddress LoadLibraryA 707 7fe43d7d-7fe43dc0 call 7fe401cb GetTickCount call 7fe43b76 706->707 708 7fe43d78 call 7fe410ce 706->708 713 7fe43dc2 707->713 714 7fe43dc8-7fe43dcd call 7fe43b76 707->714 708->707 713->714 717 7fe43dcf-7fe43de6 714->717 718 7fe43de8-7fe43df8 call 7fe463a0 call 7fe4273c 717->718 723 7fe43dfe-7fe43e1a call 7fe463a0 718->723 724 7fe43dfa-7fe43dfc 718->724 725 7fe43e1b-7fe43e1c 723->725 724->725 725->718 728 7fe43e1e-7fe43e24 725->728 728->717 729 7fe43e26-7fe43e30 call 7fe4273c 728->729 732 7fe43e32-7fe43e3a call 7fe42750 729->732 733 7fe43e3f-7fe43e78 call 7fe4273c GetVolumeInformationA 729->733 732->733 737 7fe43e82-7fe43e88 733->737 738 7fe43e7a-7fe43e80 733->738 739 7fe43e91-7fe43e9e 737->739 740 7fe43e8a 737->740 738->739 741 7fe43ea4-7fe43ec8 call 7fe43eb5 739->741 742 7fe43f25 739->742 740->739 743 7fe43f2f 741->743 751 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 741->751 742->743 745 7fe43f31-7fe43f49 CreateThread CloseHandle 743->745 746 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 743->746 745->746 760 7fe43fd3-7fe43ff8 CreateThread CloseHandle 746->760 761 7fe43ffa-7fe4400b CreateEventA 746->761 751->742 756 7fe43f20 call 7fe43405 751->756 756->742 760->761 762 7fe44012-7fe4402a call 7fe437fa 761->762 765 7fe44031-7fe44044 call 7fe43b90 762->765 766 7fe4402c-7fe4402f 762->766 774 7fe442be-7fe442c5 765->774 775 7fe4404a 765->775 766->765 767 7fe4404c-7fe44054 766->767 770 7fe44065-7fe4406e gethostbyname 767->770 771 7fe44056-7fe44063 lstrlen 767->771 772 7fe44074-7fe4407b 770->772 773 7fe44315-7fe4431b 770->773 771->770 771->771 776 7fe44081-7fe440a0 socket 772->776 773->762 777 7fe442c7-7fe442ce 774->777 778 7fe44320-7fe44322 RtlExitUserThread 774->778 775->776 776->774 779 7fe440a6-7fe440b9 connect 776->779 780 7fe442d0-7fe442dc SetEvent 777->780 781 7fe442e2-7fe442e9 777->781 782 7fe442b7-7fe442b8 closesocket 779->782 783 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 779->783 780->781 784 7fe442f2-7fe44310 Sleep ResetEvent 781->784 785 7fe442eb 781->785 782->774 796 7fe44195-7fe441a5 call 7fe43358 783->796 797 7fe44170 783->797 784->762 785->784 803 7fe441a7-7fe441bd CreateThread CloseHandle 796->803 804 7fe441c3-7fe441ca 796->804 798 7fe44192-7fe44194 797->798 799 7fe44172-7fe4418c wsprintfA 797->799 798->796 799->798 801 7fe4418e 799->801 801->798 803->804 805 7fe441d0-7fe441eb 804->805 807 7fe44210-7fe44214 805->807 808 7fe441ed-7fe441f4 805->808 807->782 809 7fe4421a-7fe4421c 807->809 808->807 810 7fe441f6-7fe44207 GetTickCount 808->810 811 7fe4421e-7fe44236 809->811 810->807 812 7fe44209 810->812 813 7fe44238 811->813 814 7fe4423b-7fe44243 811->814 812->807 813->814 814->811 815 7fe44245 814->815 816 7fe4424b-7fe4424f 815->816 817 7fe44261-7fe44263 816->817 818 7fe44251-7fe44258 call 7fe42f08 816->818 820 7fe44265-7fe4426f 817->820 818->782 823 7fe4425a 818->823 822 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 820->822 822->805 829 7fe44288-7fe44292 Sleep 822->829 823->820 826 7fe4425c-7fe4425f 823->826 826->816 829->822 830 7fe44294-7fe442a5 GetTickCount 829->830 830->805 831 7fe442ab-7fe442b2 830->831 831->782 831->805
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                      • wsprintfA.USER32 ref: 7FE43EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,7FE43691,00000000,00000000), ref: 7FE43F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 7FE43F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • SetEvent.KERNEL32(00000420,?,00000000), ref: 7FE442D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 7FE442F7
                                                                                                                      • ResetEvent.KERNEL32(00000420,?,00000000), ref: 7FE4430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateEvent$CloseHandleThreadwsprintf$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolumeconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 1567941233-1098094878
                                                                                                                      • Opcode ID: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                                                                                                      • Instruction ID: 0e4750c5ff84578107d1dc44a4ef0d59ba4f1e35034c124ccd42fec35a7c9163
                                                                                                                      • Opcode Fuzzy Hash: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                                                                                                      • Instruction Fuzzy Hash: 14E1DD71509358BEEB219F20AC0ABEA7BACEF41304F00265DFC4A9E081D6F46F45DB65

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 1086 7fe4042d-7fe404a4 call 7fe410ce 1089 7fe404a6-7fe404db call 7fe4273c GetModuleHandleA 1086->1089 1090 7fe404dd 1086->1090 1092 7fe404e4-7fe40509 call 7fe42750 GetVersion 1089->1092 1090->1092 1096 7fe4050f-7fe40530 VirtualAlloc 1092->1096 1097 7fe405ca-7fe405d1 1092->1097 1098 7fe40532-7fe40562 call 7fe40305 1096->1098 1099 7fe405a9-7fe40615 CloseHandle GetModuleHandleA call 7fe410ce 1096->1099 1097->1099 1100 7fe405d3-7fe405fc SetProcessAffinityMask call 7fe405f2 1097->1100 1098->1099 1113 7fe40564-7fe4057b 1098->1113 1112 7fe40617-7fe40630 1099->1112 1106 7fe40621-7fe40630 1100->1106 1107 7fe405fe-7fe4061c 1100->1107 1114 7fe40632 1106->1114 1115 7fe40639-7fe40652 1106->1115 1107->1106 1112->1114 1112->1115 1113->1099 1120 7fe4057d-7fe405a4 1113->1120 1114->1115 1115->1099 1116 7fe40658-7fe40671 1115->1116 1116->1099 1117 7fe40677-7fe40690 1116->1117 1117->1099 1119 7fe40696-7fe4069c 1117->1119 1121 7fe4069e-7fe406b1 1119->1121 1122 7fe406d8-7fe406de 1119->1122 1120->1099 1134 7fe405a4 call 7fe405ba 1120->1134 1121->1099 1123 7fe406b7-7fe406bd 1121->1123 1125 7fe406e0-7fe406f3 1122->1125 1126 7fe406fc-7fe40715 lstrcpyW call 7fe424ae 1122->1126 1123->1122 1127 7fe406bf-7fe406d2 1123->1127 1125->1126 1128 7fe406f5 1125->1128 1132 7fe40717-7fe40746 GetPEB lstrcpyW lstrcatW call 7fe424ae 1126->1132 1133 7fe4074c-7fe40775 NtMapViewOfSection 1126->1133 1127->1099 1127->1122 1128->1126 1132->1099 1132->1133 1133->1099 1136 7fe4077b-7fe4078f call 7fe40305 NtOpenProcessToken 1133->1136 1134->1099 1140 7fe407c5-7fe407dc CreateToolhelp32Snapshot Process32First 1136->1140 1141 7fe40791-7fe407a3 call 7fe4115d call 7fe407ac 1136->1141 1142 7fe407de-7fe407e7 1140->1142 1157 7fe407a5 1141->1157 1158 7fe4080e-7fe4080f 1141->1158 1144 7fe40810-7fe40818 call 7fe42574 1142->1144 1145 7fe407e9 1142->1145 1155 7fe4085c-7fe40863 CloseHandle 1144->1155 1156 7fe4081a-7fe40820 1144->1156 1147 7fe407eb-7fe407f5 Process32Next 1145->1147 1150 7fe40865-7fe40872 CloseHandle 1147->1150 1151 7fe407f7-7fe407fb 1147->1151 1150->1099 1151->1147 1154 7fe407fd-7fe4080d OpenProcess 1151->1154 1154->1147 1154->1158 1155->1147 1156->1155 1159 7fe40822-7fe40832 1156->1159 1157->1144 1160 7fe407a7-7fe407b5 1157->1160 1158->1144 1159->1155 1161 7fe40834-7fe4084b CreateRemoteThread 1159->1161 1160->1142 1162 7fe407b7-7fe407c4 1160->1162 1161->1155 1163 7fe4084d-7fe40857 call 7fe405ba 1161->1163 1162->1140 1163->1155
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 7FE404BE
                                                                                                                      • GetVersion.KERNEL32 ref: 7FE40500
                                                                                                                      • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 7FE40528
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE405AD
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$AllocCloseModuleVersionVirtual
                                                                                                                      • String ID: \BaseNamedObjects\tputVt$\BaseNamedObjects\tputVt$csrs
                                                                                                                      • API String ID: 3017432202-3247437241
                                                                                                                      • Opcode ID: b679b0b8245ea0d57c872b265289cd15f126cb15a0ff8aeac0b807b5cb815465
                                                                                                                      • Instruction ID: 9efcd029e5ff9f702e5d24ec4e940baa3aca8c5eca23fca7c65c58fce1734464
                                                                                                                      • Opcode Fuzzy Hash: b679b0b8245ea0d57c872b265289cd15f126cb15a0ff8aeac0b807b5cb815465
                                                                                                                      • Instruction Fuzzy Hash: 26B1AB71506349FFEB229F64E809BEA3BA9EF45714F00112CFA0A9E580C7F49B458B59

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 1165 7fe405f2-7fe40615 GetModuleHandleA call 7fe410ce 1168 7fe40617-7fe40630 1165->1168 1169 7fe405a9-7fe405b3 CloseHandle 1165->1169 1170 7fe40632 1168->1170 1171 7fe40639-7fe40652 1168->1171 1169->1165 1170->1171 1171->1169 1172 7fe40658-7fe40671 1171->1172 1172->1169 1173 7fe40677-7fe40690 1172->1173 1173->1169 1174 7fe40696-7fe4069c 1173->1174 1175 7fe4069e-7fe406b1 1174->1175 1176 7fe406d8-7fe406de 1174->1176 1175->1169 1177 7fe406b7-7fe406bd 1175->1177 1178 7fe406e0-7fe406f3 1176->1178 1179 7fe406fc-7fe40715 lstrcpyW call 7fe424ae 1176->1179 1177->1176 1180 7fe406bf-7fe406d2 1177->1180 1178->1179 1181 7fe406f5 1178->1181 1184 7fe40717-7fe40746 GetPEB lstrcpyW lstrcatW call 7fe424ae 1179->1184 1185 7fe4074c-7fe40775 NtMapViewOfSection 1179->1185 1180->1169 1180->1176 1181->1179 1184->1169 1184->1185 1185->1169 1187 7fe4077b-7fe4078f call 7fe40305 NtOpenProcessToken 1185->1187 1191 7fe407c5-7fe407dc CreateToolhelp32Snapshot Process32First 1187->1191 1192 7fe40791-7fe407a3 call 7fe4115d call 7fe407ac 1187->1192 1193 7fe407de-7fe407e7 1191->1193 1208 7fe407a5 1192->1208 1209 7fe4080e-7fe4080f 1192->1209 1195 7fe40810-7fe40818 call 7fe42574 1193->1195 1196 7fe407e9 1193->1196 1206 7fe4085c-7fe40863 CloseHandle 1195->1206 1207 7fe4081a-7fe40820 1195->1207 1198 7fe407eb-7fe407f5 Process32Next 1196->1198 1201 7fe40865-7fe40872 CloseHandle 1198->1201 1202 7fe407f7-7fe407fb 1198->1202 1201->1169 1202->1198 1205 7fe407fd-7fe4080d OpenProcess 1202->1205 1205->1198 1205->1209 1206->1198 1207->1206 1210 7fe40822-7fe40832 1207->1210 1208->1195 1211 7fe407a7-7fe407b5 1208->1211 1209->1195 1210->1206 1212 7fe40834-7fe4084b CreateRemoteThread 1210->1212 1211->1193 1213 7fe407b7-7fe407c4 1211->1213 1212->1206 1214 7fe4084d-7fe40857 call 7fe405ba 1212->1214 1213->1191 1214->1206
                                                                                                                      APIs
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE405AD
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE405EC), ref: 7FE405F2
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tputVt,\BaseNamedObjects\tputVt,?,?,?,?), ref: 7FE4070A
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tputVt,?), ref: 7FE4072D
                                                                                                                      • lstrcatW.KERNEL32(\BaseNamedObjects\tputVt,\tputVt), ref: 7FE4073B
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 7FE4076B
                                                                                                                      • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 7FE40786
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407C9
                                                                                                                      • Process32First.KERNEL32 ref: 7FE407DC
                                                                                                                      • Process32Next.KERNEL32 ref: 7FE407ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE40805
                                                                                                                      • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 7FE40842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE4085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 7FE4086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                                                                                                      • String ID: \BaseNamedObjects\tputVt$\BaseNamedObjects\tputVt$csrs
                                                                                                                      • API String ID: 1545766225-3247437241
                                                                                                                      • Opcode ID: a6e4895aee82b9b60a721676d8944f06945676ace3fd8aa3594a78ed4fbb6dc7
                                                                                                                      • Instruction ID: 92e33fe563f4ce631dd87b3f5722c0db0ec9cf3d935b64cf14b3b9bf1e8ed77e
                                                                                                                      • Opcode Fuzzy Hash: a6e4895aee82b9b60a721676d8944f06945676ace3fd8aa3594a78ed4fbb6dc7
                                                                                                                      • Instruction Fuzzy Hash: 0F718B31505205FFEB219E50EC49BBE3BBAEF49715F10102CFA0A9E490C7B59B059B99
                                                                                                                      APIs
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE44057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE44066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE441B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE441BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE441F6
                                                                                                                      • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE4428B
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE44294
                                                                                                                      • closesocket.WS2_32(6F6C6902), ref: 7FE442B8
                                                                                                                      • SetEvent.KERNEL32(00000420,?,00000000), ref: 7FE442D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 7FE442F7
                                                                                                                      • ResetEvent.KERNEL32(00000420,?,00000000), ref: 7FE4430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 883794535-1334317923
                                                                                                                      • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction ID: c034f442e2d8f513e2b327ea41ce5463e34186132653b9dadba1924edba9b606
                                                                                                                      • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction Fuzzy Hash: AF71CF75608398BAEB219F3498187EEBFADEF81314F00260CEC5A9E181C7F46B41D755
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE4344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE43469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE43493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE434A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 7FE434B8
                                                                                                                      Strings
                                                                                                                      • \Device\PhysicalMemory, xrefs: 7FE433E0
                                                                                                                      • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 7FE43414
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                                                                                                      • API String ID: 2985292042-3938670448
                                                                                                                      • Opcode ID: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                                                                                                      • Instruction ID: 7fc34539aa9aeb006e3fd3aa9e627af0260f8b81ce38453cec28ed3fa0a6c215
                                                                                                                      • Opcode Fuzzy Hash: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                                                                                                      • Instruction Fuzzy Hash: 40817671600208BFEB218F14DC89ABA3BADEF44704F504658FD1A9B295D3B4AF459BA4
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE4344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE43469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE43493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE434A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 7FE434B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                                                                                                      • API String ID: 2985292042-2835701104
                                                                                                                      • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction ID: f43c089fce9089dd7d505f4faf75d8f33636ceb6be771680bc0a2bec27c6fb95
                                                                                                                      • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction Fuzzy Hash: D5118B74640609BFEB24CF10DC55FEA367CEF88744F10451CFA1A9A290E7F46F189A28
                                                                                                                      APIs
                                                                                                                      • lstrcpyW.KERNEL32(?,\BaseNamedObjects\tputVt), ref: 7FE424BA
                                                                                                                      • lstrlenW.KERNEL32(?), ref: 7FE424C1
                                                                                                                      • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 7FE42516
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tputVt, xrefs: 7FE424B8
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateSectionlstrcpylstrlen
                                                                                                                      • String ID: \BaseNamedObjects\tputVt
                                                                                                                      • API String ID: 2597515329-2261315748
                                                                                                                      • Opcode ID: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction ID: b59113b06402ddd1e6da3b59c174d95be42712fc9add0a4248e34075b754a1f5
                                                                                                                      • Opcode Fuzzy Hash: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction Fuzzy Hash: A70181B0785344BAF7309B29CC4BF5B7929DF81B50F508558F708AE1C4DAB89A0483A9

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 832 7fe43f8f-7fe43f97 LoadLibraryA 833 7fe44320-7fe44322 RtlExitUserThread 832->833 834 7fe43f9d-7fe43fbc call 7fe410ce 832->834 834->833 837 7fe43fc2-7fe4400b WSAStartup CreateThread CloseHandle CreateEventA 834->837 839 7fe44012-7fe4402a call 7fe437fa 837->839 842 7fe44031-7fe44044 call 7fe43b90 839->842 843 7fe4402c-7fe4402f 839->843 851 7fe442be-7fe442c5 842->851 852 7fe4404a 842->852 843->842 844 7fe4404c-7fe44054 843->844 847 7fe44065-7fe4406e gethostbyname 844->847 848 7fe44056-7fe44063 lstrlen 844->848 849 7fe44074-7fe4407b 847->849 850 7fe44315-7fe4431b 847->850 848->847 848->848 853 7fe44081-7fe440a0 socket 849->853 850->839 851->833 854 7fe442c7-7fe442ce 851->854 852->853 853->851 855 7fe440a6-7fe440b9 connect 853->855 856 7fe442d0-7fe442dc SetEvent 854->856 857 7fe442e2-7fe442e9 854->857 858 7fe442b7-7fe442b8 closesocket 855->858 859 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 855->859 856->857 860 7fe442f2-7fe44310 Sleep ResetEvent 857->860 861 7fe442eb 857->861 858->851 872 7fe44195-7fe441a5 call 7fe43358 859->872 873 7fe44170 859->873 860->839 861->860 879 7fe441a7-7fe441bd CreateThread CloseHandle 872->879 880 7fe441c3-7fe441ca 872->880 874 7fe44192-7fe44194 873->874 875 7fe44172-7fe4418c wsprintfA 873->875 874->872 875->874 877 7fe4418e 875->877 877->874 879->880 881 7fe441d0-7fe441eb 880->881 883 7fe44210-7fe44214 881->883 884 7fe441ed-7fe441f4 881->884 883->858 885 7fe4421a-7fe4421c 883->885 884->883 886 7fe441f6-7fe44207 GetTickCount 884->886 887 7fe4421e-7fe44236 885->887 886->883 888 7fe44209 886->888 889 7fe44238 887->889 890 7fe4423b-7fe44243 887->890 888->883 889->890 890->887 891 7fe44245 890->891 892 7fe4424b-7fe4424f 891->892 893 7fe44261-7fe44263 892->893 894 7fe44251-7fe44258 call 7fe42f08 892->894 896 7fe44265-7fe4426f 893->896 894->858 899 7fe4425a 894->899 898 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 896->898 898->881 905 7fe44288-7fe44292 Sleep 898->905 899->896 902 7fe4425c-7fe4425f 899->902 902->892 905->898 906 7fe44294-7fe442a5 GetTickCount 905->906 906->881 907 7fe442ab-7fe442b2 906->907 907->858 907->881
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43F83), ref: 7FE43F8F
                                                                                                                      • WSAStartup.WS2_32(00000101), ref: 7FE43FCE
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE44057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE44066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE441B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE441BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE441F6
                                                                                                                      • RtlExitUserThread.NTDLL(00000000), ref: 7FE44322
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadStartupTickUserVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT$ilo.brenz.pl
                                                                                                                      • API String ID: 3316401344-1495104694
                                                                                                                      • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction ID: 258e21987668317533843a9e7f1ff18d854900d0519197baaf77827f0a23c433
                                                                                                                      • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction Fuzzy Hash: 1391AC75608348BAEB219F349819BEA7BADEF41304F00264CFC5A9E181C3F46F45DB65

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 908 7fe43eb5-7fe43ec8 LoadLibraryA call 7fe43ecc 912 7fe43f2f 908->912 913 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 908->913 914 7fe43f31-7fe43f49 CreateThread CloseHandle 912->914 915 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 912->915 919 7fe43f25 913->919 920 7fe43f20 call 7fe43405 913->920 914->915 927 7fe43fd3-7fe43ff8 CreateThread CloseHandle 915->927 928 7fe43ffa-7fe4400b CreateEventA 915->928 919->912 920->919 927->928 929 7fe44012-7fe4402a call 7fe437fa 928->929 932 7fe44031-7fe44044 call 7fe43b90 929->932 933 7fe4402c-7fe4402f 929->933 941 7fe442be-7fe442c5 932->941 942 7fe4404a 932->942 933->932 934 7fe4404c-7fe44054 933->934 937 7fe44065-7fe4406e gethostbyname 934->937 938 7fe44056-7fe44063 lstrlen 934->938 939 7fe44074-7fe4407b 937->939 940 7fe44315-7fe4431b 937->940 938->937 938->938 943 7fe44081-7fe440a0 socket 939->943 940->929 944 7fe442c7-7fe442ce 941->944 945 7fe44320-7fe44322 RtlExitUserThread 941->945 942->943 943->941 946 7fe440a6-7fe440b9 connect 943->946 947 7fe442d0-7fe442dc SetEvent 944->947 948 7fe442e2-7fe442e9 944->948 949 7fe442b7-7fe442b8 closesocket 946->949 950 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 946->950 947->948 951 7fe442f2-7fe44310 Sleep ResetEvent 948->951 952 7fe442eb 948->952 949->941 963 7fe44195-7fe441a5 call 7fe43358 950->963 964 7fe44170 950->964 951->929 952->951 970 7fe441a7-7fe441bd CreateThread CloseHandle 963->970 971 7fe441c3-7fe441ca 963->971 965 7fe44192-7fe44194 964->965 966 7fe44172-7fe4418c wsprintfA 964->966 965->963 966->965 968 7fe4418e 966->968 968->965 970->971 972 7fe441d0-7fe441eb 971->972 974 7fe44210-7fe44214 972->974 975 7fe441ed-7fe441f4 972->975 974->949 976 7fe4421a-7fe4421c 974->976 975->974 977 7fe441f6-7fe44207 GetTickCount 975->977 978 7fe4421e-7fe44236 976->978 977->974 979 7fe44209 977->979 980 7fe44238 978->980 981 7fe4423b-7fe44243 978->981 979->974 980->981 981->978 982 7fe44245 981->982 983 7fe4424b-7fe4424f 982->983 984 7fe44261-7fe44263 983->984 985 7fe44251-7fe44258 call 7fe42f08 983->985 987 7fe44265-7fe4426f 984->987 985->949 990 7fe4425a 985->990 989 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 987->989 989->972 996 7fe44288-7fe44292 Sleep 989->996 990->987 993 7fe4425c-7fe4425f 990->993 993->983 996->989 997 7fe44294-7fe442a5 GetTickCount 996->997 997->972 998 7fe442ab-7fe442b2 997->998 998->949 998->972
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43EA9), ref: 7FE43EB5
                                                                                                                        • Part of subcall function 7FE43ECC: GetProcAddress.KERNEL32(00000000,7FE43EC0), ref: 7FE43ECD
                                                                                                                        • Part of subcall function 7FE43ECC: GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                        • Part of subcall function 7FE43ECC: wsprintfA.USER32 ref: 7FE43EF7
                                                                                                                        • Part of subcall function 7FE43ECC: CreateThread.KERNEL32(00000000,00000000,7FE43691,00000000,00000000), ref: 7FE43F40
                                                                                                                        • Part of subcall function 7FE43ECC: CloseHandle.KERNEL32(?,780B832E), ref: 7FE43F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleThreadwsprintf$AddressEventFileLibraryLoadModuleNameProcVersionconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 4150863296-2633921094
                                                                                                                      • Opcode ID: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                                                                                                      • Instruction ID: 0e8994d83ddfd1691c77ce3bf3b5f199d94e5f32b824b4e6e19193fb5f8cc64f
                                                                                                                      • Opcode Fuzzy Hash: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                                                                                                      • Instruction Fuzzy Hash: D1A1FE71509348BFEB219F249C49BEA7BACEF81304F00565DF84A8E181D6F46F05DBA6

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 999 7fe43ecc-7fe43f1e GetProcAddress GetModuleFileNameA wsprintfA 1001 7fe43f25-7fe43f2f 999->1001 1002 7fe43f20 call 7fe43405 999->1002 1005 7fe43f31-7fe43f49 CreateThread CloseHandle 1001->1005 1006 7fe43f4f-7fe43fd1 call 7fe43f60 call 7fe410ce call 7fe43f8f 1001->1006 1002->1001 1005->1006 1014 7fe43fd3-7fe43ff8 CreateThread CloseHandle 1006->1014 1015 7fe43ffa-7fe4400b CreateEventA 1006->1015 1014->1015 1016 7fe44012-7fe4402a call 7fe437fa 1015->1016 1019 7fe44031-7fe44044 call 7fe43b90 1016->1019 1020 7fe4402c-7fe4402f 1016->1020 1028 7fe442be-7fe442c5 1019->1028 1029 7fe4404a 1019->1029 1020->1019 1021 7fe4404c-7fe44054 1020->1021 1024 7fe44065-7fe4406e gethostbyname 1021->1024 1025 7fe44056-7fe44063 lstrlen 1021->1025 1026 7fe44074-7fe4407b 1024->1026 1027 7fe44315-7fe4431b 1024->1027 1025->1024 1025->1025 1030 7fe44081-7fe440a0 socket 1026->1030 1027->1016 1031 7fe442c7-7fe442ce 1028->1031 1032 7fe44320-7fe44322 RtlExitUserThread 1028->1032 1029->1030 1030->1028 1033 7fe440a6-7fe440b9 connect 1030->1033 1034 7fe442d0-7fe442dc SetEvent 1031->1034 1035 7fe442e2-7fe442e9 1031->1035 1036 7fe442b7-7fe442b8 closesocket 1033->1036 1037 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 1033->1037 1034->1035 1038 7fe442f2-7fe44310 Sleep ResetEvent 1035->1038 1039 7fe442eb 1035->1039 1036->1028 1050 7fe44195-7fe441a5 call 7fe43358 1037->1050 1051 7fe44170 1037->1051 1038->1016 1039->1038 1057 7fe441a7-7fe441bd CreateThread CloseHandle 1050->1057 1058 7fe441c3-7fe441ca 1050->1058 1052 7fe44192-7fe44194 1051->1052 1053 7fe44172-7fe4418c wsprintfA 1051->1053 1052->1050 1053->1052 1055 7fe4418e 1053->1055 1055->1052 1057->1058 1059 7fe441d0-7fe441eb 1058->1059 1061 7fe44210-7fe44214 1059->1061 1062 7fe441ed-7fe441f4 1059->1062 1061->1036 1063 7fe4421a-7fe4421c 1061->1063 1062->1061 1064 7fe441f6-7fe44207 GetTickCount 1062->1064 1065 7fe4421e-7fe44236 1063->1065 1064->1061 1066 7fe44209 1064->1066 1067 7fe44238 1065->1067 1068 7fe4423b-7fe44243 1065->1068 1066->1061 1067->1068 1068->1065 1069 7fe44245 1068->1069 1070 7fe4424b-7fe4424f 1069->1070 1071 7fe44261-7fe44263 1070->1071 1072 7fe44251-7fe44258 call 7fe42f08 1070->1072 1074 7fe44265-7fe4426f 1071->1074 1072->1036 1077 7fe4425a 1072->1077 1076 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 1074->1076 1076->1059 1083 7fe44288-7fe44292 Sleep 1076->1083 1077->1074 1080 7fe4425c-7fe4425f 1077->1080 1080->1070 1083->1076 1084 7fe44294-7fe442a5 GetTickCount 1083->1084 1084->1059 1085 7fe442ab-7fe442b2 1084->1085 1085->1036 1085->1059
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43EC0), ref: 7FE43ECD
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                      • wsprintfA.USER32 ref: 7FE43EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,7FE43691,00000000,00000000), ref: 7FE43F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 7FE43F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                        • Part of subcall function 7FE43405: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE4344A
                                                                                                                        • Part of subcall function 7FE43405: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE43469
                                                                                                                        • Part of subcall function 7FE43405: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE43493
                                                                                                                        • Part of subcall function 7FE43405: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE434A0
                                                                                                                        • Part of subcall function 7FE43405: UnmapViewOfFile.KERNEL32(?), ref: 7FE434B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmapwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 541178049-2633921094
                                                                                                                      • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction ID: 0676d137f508c61ec9ecc8346a0bbca927df192c87e92b4f0c786ccd2b6385cd
                                                                                                                      • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction Fuzzy Hash: E7A1ED71508358BFEB219F249C49BEA7BACEF81304F00565DF84A9E081D6F46F45CBA6

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 1216 7fe43f60-7fe43f73 LoadLibraryA 1217 7fe43f7e-7fe43fd1 call 7fe43f8f 1216->1217 1218 7fe43f79 call 7fe410ce 1216->1218 1222 7fe43fd3-7fe43ff8 CreateThread CloseHandle 1217->1222 1223 7fe43ffa-7fe4400b CreateEventA 1217->1223 1218->1217 1222->1223 1224 7fe44012-7fe4402a call 7fe437fa 1223->1224 1227 7fe44031-7fe44044 call 7fe43b90 1224->1227 1228 7fe4402c-7fe4402f 1224->1228 1236 7fe442be-7fe442c5 1227->1236 1237 7fe4404a 1227->1237 1228->1227 1229 7fe4404c-7fe44054 1228->1229 1232 7fe44065-7fe4406e gethostbyname 1229->1232 1233 7fe44056-7fe44063 lstrlen 1229->1233 1234 7fe44074-7fe4407b 1232->1234 1235 7fe44315-7fe4431b 1232->1235 1233->1232 1233->1233 1238 7fe44081-7fe440a0 socket 1234->1238 1235->1224 1239 7fe442c7-7fe442ce 1236->1239 1240 7fe44320-7fe44322 RtlExitUserThread 1236->1240 1237->1238 1238->1236 1241 7fe440a6-7fe440b9 connect 1238->1241 1242 7fe442d0-7fe442dc SetEvent 1239->1242 1243 7fe442e2-7fe442e9 1239->1243 1244 7fe442b7-7fe442b8 closesocket 1241->1244 1245 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 1241->1245 1242->1243 1246 7fe442f2-7fe44310 Sleep ResetEvent 1243->1246 1247 7fe442eb 1243->1247 1244->1236 1258 7fe44195-7fe441a5 call 7fe43358 1245->1258 1259 7fe44170 1245->1259 1246->1224 1247->1246 1265 7fe441a7-7fe441bd CreateThread CloseHandle 1258->1265 1266 7fe441c3-7fe441ca 1258->1266 1260 7fe44192-7fe44194 1259->1260 1261 7fe44172-7fe4418c wsprintfA 1259->1261 1260->1258 1261->1260 1263 7fe4418e 1261->1263 1263->1260 1265->1266 1267 7fe441d0-7fe441eb 1266->1267 1269 7fe44210-7fe44214 1267->1269 1270 7fe441ed-7fe441f4 1267->1270 1269->1244 1271 7fe4421a-7fe4421c 1269->1271 1270->1269 1272 7fe441f6-7fe44207 GetTickCount 1270->1272 1273 7fe4421e-7fe44236 1271->1273 1272->1269 1274 7fe44209 1272->1274 1275 7fe44238 1273->1275 1276 7fe4423b-7fe44243 1273->1276 1274->1269 1275->1276 1276->1273 1277 7fe44245 1276->1277 1278 7fe4424b-7fe4424f 1277->1278 1279 7fe44261-7fe44263 1278->1279 1280 7fe44251-7fe44258 call 7fe42f08 1278->1280 1282 7fe44265-7fe4426f 1279->1282 1280->1244 1285 7fe4425a 1280->1285 1284 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 1282->1284 1284->1267 1291 7fe44288-7fe44292 Sleep 1284->1291 1285->1282 1288 7fe4425c-7fe4425f 1285->1288 1288->1278 1291->1284 1292 7fe44294-7fe442a5 GetTickCount 1291->1292 1292->1267 1293 7fe442ab-7fe442b2 1292->1293 1293->1244 1293->1267
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43F54), ref: 7FE43F60
                                                                                                                        • Part of subcall function 7FE43F8F: LoadLibraryA.KERNEL32(7FE43F83), ref: 7FE43F8F
                                                                                                                        • Part of subcall function 7FE43F8F: WSAStartup.WS2_32(00000101), ref: 7FE43FCE
                                                                                                                        • Part of subcall function 7FE43F8F: CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                        • Part of subcall function 7FE43F8F: CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                        • Part of subcall function 7FE43F8F: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                        • Part of subcall function 7FE43F8F: socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                        • Part of subcall function 7FE43F8F: connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                        • Part of subcall function 7FE43F8F: GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE44057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE44066
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE441B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE441BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE441F6
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleLibraryLoadThread$CountEventStartupTickVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2996464229-1334317923
                                                                                                                      • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction ID: 4e50c4f88f24425f4bee18bfb6ce842719449d350e033f98fb2c42de0991043e
                                                                                                                      • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction Fuzzy Hash: 0781EE71608398BEEB228F349C19BEA7BADEF41314F04165DE84A8E1C1C2F46B45C766

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 1294 7fe4388e-7fe438d4 GetSystemTime call 7fe4273c 1297 7fe438da-7fe438e0 call 7fe4384f 1294->1297 1300 7fe438e2-7fe438ea 1297->1300 1301 7fe438eb-7fe438ec 1300->1301 1302 7fe438f1-7fe438f8 call 7fe4384f 1301->1302 1305 7fe438fa-7fe438fe 1302->1305 1305->1301 1306 7fe43900 1305->1306 1307 7fe43907-7fe43911 call 7fe437fa Sleep 1306->1307 1310 7fe43917-7fe4391e 1307->1310 1311 7fe43924-7fe43933 InternetGetConnectedState 1310->1311 1312 7fe43a32-7fe43a36 1310->1312 1311->1307 1313 7fe43935-7fe43941 call 7fe4273c 1311->1313 1316 7fe43943-7fe4394a 1313->1316 1317 7fe43951-7fe43952 1316->1317 1318 7fe4394c-7fe4394e 1316->1318 1317->1316 1319 7fe43954-7fe43974 gethostbyname 1318->1319 1320 7fe43950 1318->1320 1321 7fe43a26-7fe43a2c 1319->1321 1322 7fe4397a-7fe4398a socket 1319->1322 1320->1317 1321->1310 1321->1312 1322->1321 1323 7fe43990-7fe439e1 ioctlsocket connect Sleep 1322->1323 1325 7fe439e3-7fe439f2 call 7fe42b1c 1323->1325 1326 7fe43a1f-7fe43a20 closesocket 1323->1326 1325->1326 1329 7fe439f4-7fe43a01 1325->1329 1326->1321 1330 7fe43a03-7fe43a11 1329->1330 1331 7fe43a18 1329->1331 1330->1331 1331->1326
                                                                                                                      APIs
                                                                                                                      • GetSystemTime.KERNEL32(7FE47584), ref: 7FE4389F
                                                                                                                      • Sleep.KERNEL32(0000EA60), ref: 7FE43911
                                                                                                                      • InternetGetConnectedState.WININET(?,00000000), ref: 7FE4392A
                                                                                                                      • gethostbyname.WS2_32(0D278125), ref: 7FE4396C
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE43981
                                                                                                                      • ioctlsocket.WS2_32(?,8004667E), ref: 7FE4399A
                                                                                                                      • connect.WS2_32(?,?,00000010), ref: 7FE439B3
                                                                                                                      • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 7FE439C1
                                                                                                                      • closesocket.WS2_32 ref: 7FE43A20
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep$ConnectedInternetStateSystemTimeclosesocketconnectgethostbynameioctlsocketsocket
                                                                                                                      • String ID: ueqfel.com
                                                                                                                      • API String ID: 159131500-2992884172
                                                                                                                      • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction ID: eea604ef3eef491c3b4b486964eb23317b1c68c5be79fae7d3127a3215423796
                                                                                                                      • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction Fuzzy Hash: 4241B131644348BEEB218E209C49BE9BB6EEF85754F04512DF94ADE1C1D7F5AB40A720
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 7FE4144A: LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE4145A
                                                                                                                        • Part of subcall function 7FE4144A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE4146A
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE405AD
                                                                                                                      • FreeLibrary.KERNEL32(75670000,?,7FE4079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407B8
                                                                                                                      • CloseHandle.KERNEL32(?,?,7FE4079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407BF
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407C9
                                                                                                                      • Process32First.KERNEL32 ref: 7FE407DC
                                                                                                                      • Process32Next.KERNEL32 ref: 7FE407ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE40805
                                                                                                                      • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 7FE40842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE4085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 7FE4086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                                                                                                      • String ID: csrs
                                                                                                                      • API String ID: 3908997113-2321902090
                                                                                                                      • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction ID: a6d35856a40c53af25f3dd880ced36f98488441f4133b4430f7fa635e460986d
                                                                                                                      • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction Fuzzy Hash: AB113030501205BBEB255F21DD49BBF3A6DEF54711F00112CF94B99081C6B49B018AAA
                                                                                                                      APIs
                                                                                                                      • GetTempPathA.KERNEL32(00000104), ref: 7FE4278C
                                                                                                                        • Part of subcall function 7FE427A7: GetTempFileNameA.KERNEL32(?,7FE427A3,00000000,?), ref: 7FE427A8
                                                                                                                        • Part of subcall function 7FE427A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE427A3,00000000,?), ref: 7FE427C3
                                                                                                                        • Part of subcall function 7FE427A7: InternetReadFile.WININET(?,?,00000104), ref: 7FE427DD
                                                                                                                        • Part of subcall function 7FE427A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427F3
                                                                                                                        • Part of subcall function 7FE427A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427FF
                                                                                                                        • Part of subcall function 7FE427A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE427A3), ref: 7FE42823
                                                                                                                        • Part of subcall function 7FE427A7: InternetCloseHandle.WININET(?), ref: 7FE42833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 7FE4283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$CreateTemp$NamePathProcessReadWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1995088466-0
                                                                                                                      • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction ID: d2f72ca38739e1223d228fa8915e7a2d59a899e2c4950480ab4928b4c105e288
                                                                                                                      • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction Fuzzy Hash: C821D2B1145306BFE7215B20DC8EFFF3A2DEF95B10F000119FA4A99081D7B19A15C6BA
                                                                                                                      APIs
                                                                                                                      • GetTempFileNameA.KERNEL32(?,7FE427A3,00000000,?), ref: 7FE427A8
                                                                                                                      • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE427A3,00000000,?), ref: 7FE427C3
                                                                                                                      • InternetReadFile.WININET(?,?,00000104), ref: 7FE427DD
                                                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427F3
                                                                                                                      • CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427FF
                                                                                                                      • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE427A3), ref: 7FE42823
                                                                                                                      • InternetCloseHandle.WININET(?), ref: 7FE42833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 7FE4283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$Create$NameProcessReadTempWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3452404049-0
                                                                                                                      • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction ID: 22dcc7b0365fcf1d6eb4fed4657db19a0a0b5e3cffdb9644fcda0f43dbdbc4f6
                                                                                                                      • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction Fuzzy Hash: B8116DB1100606BBEB250F21DC4EFFF7A2DEF89B14F004519FA0699080DBF5AA5196A8
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(039EF878), ref: 7FE4113D
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE411D6), ref: 7FE41148
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 0000000C.00000002.1696529532.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_12_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressHandleModuleProc
                                                                                                                      • String ID: .DLL
                                                                                                                      • API String ID: 1646373207-899428287
                                                                                                                      • Opcode ID: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction ID: ea4a2056f9d9eec985f90d0e6f51664608bc9cd6dcfcab51fc2ae76c9b6c8238
                                                                                                                      • Opcode Fuzzy Hash: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction Fuzzy Hash: D301E130607204EACF538F38E945BBE3B7DEB04265F20211DF90A8A759C7789A408B95

                                                                                                                      Execution Graph

                                                                                                                      Execution Coverage:2.7%
                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                      Signature Coverage:0%
                                                                                                                      Total number of Nodes:656
                                                                                                                      Total number of Limit Nodes:1
                                                                                                                      execution_graph 6608 7fe42665 6610 7fe4266b CreateThread CloseHandle 6608->6610 6611 7fe43c38 6610->6611 6613 7fe43c3d 6611->6613 6614 7fe43ca9 6613->6614 6617 7fe43c5b GetWindowsDirectoryA 6613->6617 6668 7fe4252f NtOpenSection 6614->6668 6616 7fe43cae 6619 7fe43cb5 6616->6619 6620 7fe43cfb GetSystemDirectoryA 6616->6620 6621 7fe43d26 6617->6621 6669 7fe43cc2 GetModuleHandleA 6619->6669 6713 7fe43d1f lstrcat 6620->6713 6755 7fe43d36 LoadLibraryA 6621->6755 6668->6616 6670 7fe43cde 6669->6670 6671 7fe43ccc 6669->6671 6796 7fe43cf0 GetModuleHandleA 6670->6796 6673 7fe43cd4 GetProcAddress 6671->6673 6673->6670 6714 7fe43d26 6713->6714 6715 7fe43d36 151 API calls 6714->6715 6716 7fe43d2b GetProcAddress LoadLibraryA 6715->6716 6718 7fe43d7d 6716->6718 6719 7fe410ce 2 API calls 6716->6719 6720 7fe43d92 GetTickCount 6718->6720 6719->6718 6721 7fe43daa 6720->6721 6722 7fe43e47 GetVolumeInformationA 6721->6722 6723 7fe43e7a 6722->6723 6724 7fe43f25 6723->6724 6725 7fe43eb5 96 API calls 6723->6725 6727 7fe43f31 CreateThread CloseHandle 6724->6727 6728 7fe43f4f 6724->6728 6726 7fe43ea9 6725->6726 6726->6724 6731 7fe43eca GetModuleFileNameA wsprintfA 6726->6731 6727->6728 6729 7fe43f60 43 API calls 6728->6729 6730 7fe43f54 6729->6730 6732 7fe43f7e 6730->6732 6733 7fe410ce 2 API calls 6730->6733 6734 7fe43f14 6731->6734 6735 7fe43f8f 23 API calls 6732->6735 6733->6732 6734->6724 6737 7fe43405 5 API calls 6734->6737 6736 7fe43f83 6735->6736 6738 7fe43fd6 CreateThread CloseHandle 6736->6738 6739 7fe43ffa CreateEventA 6736->6739 6737->6724 6738->6739 6752 7fe44012 6739->6752 6740 7fe44065 gethostbyname 6740->6752 6741 7fe44056 lstrlen 6741->6740 6741->6741 6742 7fe44320 RtlExitUserThread 6743 7fe44081 socket 6744 7fe440a6 connect 6743->6744 6743->6752 6746 7fe442b7 closesocket 6744->6746 6744->6752 6745 7fe442d0 SetEvent 6745->6752 6746->6752 6747 7fe442f2 Sleep ResetEvent 6747->6752 6748 7fe440ef GetVersionExA 6748->6752 6749 7fe44172 wsprintfA 6749->6752 6750 7fe441a7 CreateThread CloseHandle 6750->6752 6751 7fe441f6 GetTickCount 6751->6752 6752->6740 6752->6741 6752->6742 6752->6743 6752->6745 6752->6746 6752->6747 6752->6748 6752->6749 6752->6750 6752->6751 6753 7fe44288 Sleep 6752->6753 6753->6752 6754 7fe44294 GetTickCount 6753->6754 6754->6752 6954 7fe43d4b GetProcAddress LoadLibraryA 6755->6954 6839 7fe426d4 6796->6839 6799 7fe43d1f 179 API calls 6800 7fe43d12 GetProcAddress LoadLibraryA 6799->6800 6802 7fe43d7d 6800->6802 6803 7fe410ce 2 API calls 6800->6803 6804 7fe43d92 GetTickCount 6802->6804 6803->6802 6805 7fe43daa 6804->6805 6806 7fe43e47 GetVolumeInformationA 6805->6806 6807 7fe43e7a 6806->6807 6808 7fe43f25 6807->6808 6841 7fe43eb5 LoadLibraryA 6807->6841 6811 7fe43f31 CreateThread CloseHandle 6808->6811 6812 7fe43f4f 6808->6812 6811->6812 6873 7fe43f60 LoadLibraryA 6812->6873 6840 7fe426c8 GetSystemDirectoryA 6839->6840 6840->6799 6895 7fe43ecc GetProcAddress GetModuleFileNameA wsprintfA 6841->6895 6874 7fe410ce 2 API calls 6873->6874 6875 7fe43f7e 6874->6875 6876 7fe43f8f 23 API calls 6875->6876 6877 7fe43f83 6876->6877 6878 7fe43fd6 CreateThread CloseHandle 6877->6878 6879 7fe43ffa CreateEventA 6877->6879 6878->6879 6890 7fe44012 6879->6890 6880 7fe44065 gethostbyname 6880->6890 6881 7fe44056 lstrlen 6881->6880 6881->6881 6882 7fe44320 RtlExitUserThread 6883 7fe44081 socket 6884 7fe440a6 connect 6883->6884 6883->6890 6886 7fe442b7 closesocket 6884->6886 6884->6890 6885 7fe442d0 SetEvent 6885->6890 6886->6890 6887 7fe442f2 Sleep ResetEvent 6887->6890 6888 7fe440ef GetVersionExA 6888->6890 6889 7fe44172 wsprintfA 6889->6890 6890->6880 6890->6881 6890->6882 6890->6883 6890->6885 6890->6886 6890->6887 6890->6888 6890->6889 6891 7fe441a7 CreateThread CloseHandle 6890->6891 6892 7fe441f6 GetTickCount 6890->6892 6893 7fe44288 Sleep 6890->6893 6891->6890 6892->6890 6893->6890 6894 7fe44294 GetTickCount 6893->6894 6894->6890 6896 7fe43f14 6895->6896 6897 7fe43f25 6896->6897 6924 7fe43405 6896->6924 6899 7fe43f31 CreateThread CloseHandle 6897->6899 6900 7fe43f4f 6897->6900 6899->6900 6901 7fe43f60 43 API calls 6900->6901 6902 7fe43f54 6901->6902 6903 7fe43f7e 6902->6903 6904 7fe410ce 2 API calls 6902->6904 6933 7fe43f8f LoadLibraryA 6903->6933 6904->6903 6925 7fe4343b 6924->6925 6925->6925 6926 7fe43440 NtOpenSection 6925->6926 6927 7fe4344e 6926->6927 6928 7fe4345f NtQuerySystemInformation 6927->6928 6932 7fe435f3 6927->6932 6929 7fe4346f MapViewOfFile CloseHandle 6928->6929 6931 7fe434b0 6929->6931 6929->6932 6930 7fe434b7 UnmapViewOfFile 6930->6932 6931->6930 6931->6932 6932->6897 6934 7fe44320 RtlExitUserThread 6933->6934 6935 7fe43f9d 6933->6935 6936 7fe410ce 2 API calls 6935->6936 6937 7fe43fb5 6936->6937 6937->6934 6938 7fe43fc2 WSAStartup CreateThread CloseHandle 6937->6938 6939 7fe43ffa CreateEventA 6938->6939 6951 7fe44012 6939->6951 6940 7fe44065 gethostbyname 6940->6951 6941 7fe44056 lstrlen 6941->6940 6941->6941 6942 7fe44081 socket 6943 7fe440a6 connect 6942->6943 6942->6951 6945 7fe442b7 closesocket 6943->6945 6943->6951 6944 7fe442d0 SetEvent 6944->6951 6945->6951 6946 7fe442f2 Sleep ResetEvent 6946->6951 6947 7fe440ef GetVersionExA 6947->6951 6948 7fe44172 wsprintfA 6948->6951 6949 7fe441a7 CreateThread CloseHandle 6949->6951 6950 7fe441f6 GetTickCount 6950->6951 6951->6934 6951->6940 6951->6941 6951->6942 6951->6944 6951->6945 6951->6946 6951->6947 6951->6948 6951->6949 6951->6950 6952 7fe44288 Sleep 6951->6952 6952->6951 6953 7fe44294 GetTickCount 6952->6953 6953->6951 6955 7fe410ce 2 API calls 6954->6955 6956 7fe43d7d 6955->6956 6957 7fe43d92 GetTickCount 6956->6957 6958 7fe43daa 6957->6958 6959 7fe43e47 GetVolumeInformationA 6958->6959 6960 7fe43e7a 6959->6960 6961 7fe43f25 6960->6961 6962 7fe43eb5 96 API calls 6960->6962 6964 7fe43f31 CreateThread CloseHandle 6961->6964 6965 7fe43f4f 6961->6965 6963 7fe43ea9 6962->6963 6963->6961 6968 7fe43eca GetModuleFileNameA wsprintfA 6963->6968 6964->6965 6966 7fe43f60 43 API calls 6965->6966 6967 7fe43f54 6966->6967 6969 7fe43f7e 6967->6969 6970 7fe410ce 2 API calls 6967->6970 6971 7fe43f14 6968->6971 6972 7fe43f8f 23 API calls 6969->6972 6970->6969 6971->6961 6974 7fe43405 5 API calls 6971->6974 6973 7fe43f83 6972->6973 6975 7fe43fd6 CreateThread CloseHandle 6973->6975 6976 7fe43ffa CreateEventA 6973->6976 6974->6961 6975->6976 6989 7fe44012 6976->6989 6977 7fe44065 gethostbyname 6977->6989 6978 7fe44056 lstrlen 6978->6977 6978->6978 6979 7fe44320 RtlExitUserThread 6980 7fe44081 socket 6981 7fe440a6 connect 6980->6981 6980->6989 6983 7fe442b7 closesocket 6981->6983 6981->6989 6982 7fe442d0 SetEvent 6982->6989 6983->6989 6984 7fe442f2 Sleep ResetEvent 6984->6989 6985 7fe440ef GetVersionExA 6985->6989 6986 7fe44172 wsprintfA 6986->6989 6987 7fe441a7 CreateThread CloseHandle 6987->6989 6988 7fe441f6 GetTickCount 6988->6989 6989->6977 6989->6978 6989->6979 6989->6980 6989->6982 6989->6983 6989->6984 6989->6985 6989->6986 6989->6987 6989->6988 6990 7fe44288 Sleep 6989->6990 6990->6989 6991 7fe44294 GetTickCount 6990->6991 6991->6989 6310 7fe433e0 6311 7fe433e5 6310->6311 6312 7fe4344e 6310->6312 6313 7fe4346f MapViewOfFile CloseHandle 6311->6313 6315 7fe43440 NtOpenSection 6311->6315 6314 7fe4345f NtQuerySystemInformation 6312->6314 6318 7fe435f3 6312->6318 6317 7fe434b0 6313->6317 6313->6318 6314->6313 6315->6312 6316 7fe434b7 UnmapViewOfFile 6316->6318 6317->6316 6317->6318 7048 7fe46620 7051 7fe46647 7048->7051 7052 7fe46652 7051->7052 7053 7fe4662a 7051->7053 7055 7fe46658 7052->7055 7056 7fe42574 5 API calls 7055->7056 7057 7fe4666a 7056->7057 7057->7053 7058 aa116f LoadLibraryA 7063 aa1196 GetProcAddress 7058->7063 7060 aa1277 7061 aa1180 7061->7060 7062 aa142f LookupPrivilegeValueA NtAdjustPrivilegesToken 7061->7062 7063->7061 7064 7fe41422 LookupPrivilegeValueA NtAdjustPrivilegesToken 7011 aa662d 7014 aa6647 7011->7014 7015 aa6637 7014->7015 7016 aa6652 7014->7016 7018 aa6658 7016->7018 7019 aa2574 5 API calls 7018->7019 7020 aa666a 7019->7020 7020->7015 7021 aa1422 7022 aa142f LookupPrivilegeValueA NtAdjustPrivilegesToken 7021->7022 7065 aa2762 7067 aa2768 7065->7067 7068 aa2839 InternetCloseHandle 7067->7068 7069 aa2780 GetTempPathA 7067->7069 7077 aa27a7 GetTempFileNameA CreateFileA 7069->7077 7071 aa27a3 CreateFileA 7072 aa2829 InternetCloseHandle 7071->7072 7073 aa27ce InternetReadFile 7071->7073 7072->7068 7074 aa27e8 7073->7074 7075 aa27fe CloseHandle CreateProcessA 7073->7075 7074->7075 7076 aa27ea WriteFile 7074->7076 7075->7072 7076->7073 7076->7075 7078 aa2829 InternetCloseHandle 7077->7078 7079 aa27ce InternetReadFile 7077->7079 7082 aa2839 InternetCloseHandle 7078->7082 7080 aa27e8 7079->7080 7081 aa27fe CloseHandle CreateProcessA 7079->7081 7080->7081 7083 aa27ea WriteFile 7080->7083 7081->7078 7082->7071 7083->7079 7083->7081 6455 7fe443ad 6456 7fe443b9 6455->6456 6459 7fe443dd 6456->6459 6458 7fe443c4 6462 7fe4144a LookupPrivilegeValueA NtAdjustPrivilegesToken 6459->6462 6461 7fe443e3 6461->6458 6462->6461 6463 aa33e0 6464 aa33e5 6463->6464 6465 aa346f MapViewOfFile CloseHandle 6464->6465 6466 aa3440 NtOpenSection 6464->6466 6469 aa34b0 6465->6469 6470 aa35f3 6465->6470 6468 aa345f NtQuerySystemInformation 6466->6468 6466->6470 6467 aa34b7 UnmapViewOfFile 6467->6470 6468->6465 6469->6467 6469->6470 7023 aa6620 7024 aa6647 5 API calls 7023->7024 7025 aa662a 7024->7025 6291 7fe44c6b 6294 7fe44c9e 6291->6294 6295 7fe44caa 6294->6295 6302 7fe44499 6295->6302 6297 7fe44cb7 6298 7fe44499 3 API calls 6297->6298 6301 7fe44d64 6297->6301 6299 7fe44d58 6298->6299 6300 7fe44499 3 API calls 6299->6300 6299->6301 6300->6301 6303 7fe444a3 CreateFileA 6302->6303 6305 7fe444fc CreateFileMappingA 6303->6305 6307 7fe44573 MapViewOfFile 6305->6307 6309 7fe445a8 6307->6309 6309->6297 7087 aa2665 7089 aa266b CreateThread CloseHandle 7087->7089 7090 aa3c38 7089->7090 7092 aa3c3d 7090->7092 7093 aa3ca9 7092->7093 7096 aa3c5b GetWindowsDirectoryA 7092->7096 7147 aa252f NtOpenSection 7093->7147 7095 aa3cae 7098 aa3cfb GetSystemDirectoryA 7095->7098 7099 aa3cb5 7095->7099 7102 aa3d26 7096->7102 7192 aa3d1f lstrcat 7098->7192 7148 aa3cc2 GetModuleHandleA 7099->7148 7234 aa3d36 LoadLibraryA 7102->7234 7147->7095 7149 aa3ccc 7148->7149 7150 aa3cde 7148->7150 7153 aa3cd4 GetProcAddress 7149->7153 7275 aa3cf0 GetModuleHandleA 7150->7275 7153->7150 7193 aa3d26 7192->7193 7194 aa3d36 151 API calls 7193->7194 7195 aa3d2b GetProcAddress LoadLibraryA 7194->7195 7197 aa10ce 2 API calls 7195->7197 7198 aa3d7d 7197->7198 7199 aa3d92 GetTickCount 7198->7199 7200 aa3daa 7199->7200 7201 aa3e47 GetVolumeInformationA 7200->7201 7202 aa3e7a 7201->7202 7203 aa3f25 7202->7203 7204 aa3eb5 96 API calls 7202->7204 7205 aa3f4f 7203->7205 7206 aa3f31 CreateThread CloseHandle 7203->7206 7207 aa3ea9 7204->7207 7208 aa3f60 43 API calls 7205->7208 7206->7205 7207->7203 7209 aa3f14 7207->7209 7211 aa3eca GetModuleFileNameA wsprintfA 7207->7211 7210 aa3f54 7208->7210 7209->7203 7213 aa3405 5 API calls 7209->7213 7212 aa10ce 2 API calls 7210->7212 7211->7209 7214 aa3f7e 7212->7214 7213->7203 7215 aa3f8f 23 API calls 7214->7215 7216 aa3f83 7215->7216 7217 aa3ffa CreateEventA 7216->7217 7218 aa3fd3 CreateThread CloseHandle 7216->7218 7231 aa4012 7217->7231 7218->7217 7219 aa4056 lstrlen 7219->7219 7220 aa4065 gethostbyname 7219->7220 7220->7231 7221 aa4081 socket 7223 aa40a6 connect 7221->7223 7221->7231 7222 aa4320 RtlExitUserThread 7226 aa42b7 closesocket 7223->7226 7223->7231 7224 aa42d0 SetEvent 7224->7231 7225 aa42f2 Sleep ResetEvent 7225->7231 7226->7231 7227 aa40ef GetVersionExA 7227->7231 7228 aa4172 wsprintfA 7228->7231 7229 aa41a7 CreateThread CloseHandle 7229->7231 7230 aa41f6 GetTickCount 7230->7231 7231->7219 7231->7220 7231->7221 7231->7222 7231->7224 7231->7225 7231->7226 7231->7227 7231->7228 7231->7229 7231->7230 7232 aa4288 Sleep 7231->7232 7232->7231 7233 aa4294 GetTickCount 7232->7233 7233->7231 7432 aa3d4b GetProcAddress LoadLibraryA 7234->7432 7318 aa26d4 7275->7318 7278 aa3d1f 179 API calls 7279 aa3d12 GetProcAddress LoadLibraryA 7278->7279 7281 aa10ce 2 API calls 7279->7281 7282 aa3d7d 7281->7282 7283 aa3d92 GetTickCount 7282->7283 7284 aa3daa 7283->7284 7285 aa3e47 GetVolumeInformationA 7284->7285 7286 aa3e7a 7285->7286 7287 aa3f25 7286->7287 7320 aa3eb5 LoadLibraryA 7286->7320 7289 aa3f4f 7287->7289 7290 aa3f31 CreateThread CloseHandle 7287->7290 7352 aa3f60 LoadLibraryA 7289->7352 7290->7289 7319 aa26c8 GetSystemDirectoryA 7318->7319 7319->7278 7374 aa3ecc GetProcAddress GetModuleFileNameA wsprintfA 7320->7374 7353 aa3f7e 7352->7353 7354 aa10ce 2 API calls 7352->7354 7355 aa3f8f 23 API calls 7353->7355 7354->7353 7356 aa3f83 7355->7356 7357 aa3ffa CreateEventA 7356->7357 7358 aa3fd3 CreateThread CloseHandle 7356->7358 7361 aa4012 7357->7361 7358->7357 7359 aa4056 lstrlen 7359->7359 7360 aa4065 gethostbyname 7359->7360 7360->7361 7361->7359 7361->7360 7362 aa4081 socket 7361->7362 7363 aa4320 RtlExitUserThread 7361->7363 7365 aa42d0 SetEvent 7361->7365 7366 aa42f2 Sleep ResetEvent 7361->7366 7367 aa42b7 closesocket 7361->7367 7368 aa40ef GetVersionExA 7361->7368 7369 aa4172 wsprintfA 7361->7369 7370 aa41a7 CreateThread CloseHandle 7361->7370 7371 aa41f6 GetTickCount 7361->7371 7372 aa4288 Sleep 7361->7372 7362->7361 7364 aa40a6 connect 7362->7364 7364->7361 7364->7367 7365->7361 7366->7361 7367->7361 7368->7361 7369->7361 7370->7361 7371->7361 7372->7361 7373 aa4294 GetTickCount 7372->7373 7373->7361 7375 aa3f14 7374->7375 7376 aa3f25 7375->7376 7403 aa3405 7375->7403 7378 aa3f4f 7376->7378 7379 aa3f31 CreateThread CloseHandle 7376->7379 7380 aa3f60 43 API calls 7378->7380 7379->7378 7381 aa3f54 7380->7381 7382 aa10ce 2 API calls 7381->7382 7383 aa3f7e 7382->7383 7411 aa3f8f LoadLibraryA 7383->7411 7404 aa343b 7403->7404 7404->7404 7405 aa3440 NtOpenSection 7404->7405 7406 aa345f NtQuerySystemInformation 7405->7406 7410 aa35f3 7405->7410 7407 aa346f MapViewOfFile CloseHandle 7406->7407 7409 aa34b0 7407->7409 7407->7410 7408 aa34b7 UnmapViewOfFile 7408->7410 7409->7408 7409->7410 7410->7376 7412 aa3f9d 7411->7412 7413 aa4320 RtlExitUserThread 7411->7413 7414 aa10ce 2 API calls 7412->7414 7415 aa3fb5 7414->7415 7415->7413 7416 aa3fc2 WSAStartup CreateThread CloseHandle 7415->7416 7417 aa3ffa CreateEventA 7416->7417 7420 aa4012 7417->7420 7418 aa4056 lstrlen 7418->7418 7419 aa4065 gethostbyname 7418->7419 7419->7420 7420->7413 7420->7418 7420->7419 7421 aa4081 socket 7420->7421 7423 aa42d0 SetEvent 7420->7423 7424 aa42f2 Sleep ResetEvent 7420->7424 7425 aa42b7 closesocket 7420->7425 7426 aa40ef GetVersionExA 7420->7426 7427 aa4172 wsprintfA 7420->7427 7428 aa41a7 CreateThread CloseHandle 7420->7428 7429 aa41f6 GetTickCount 7420->7429 7430 aa4288 Sleep 7420->7430 7421->7420 7422 aa40a6 connect 7421->7422 7422->7420 7422->7425 7423->7420 7424->7420 7425->7420 7426->7420 7427->7420 7428->7420 7429->7420 7430->7420 7431 aa4294 GetTickCount 7430->7431 7431->7420 7433 aa3d7d 7432->7433 7434 aa10ce 2 API calls 7432->7434 7435 aa3d92 GetTickCount 7433->7435 7434->7433 7436 aa3daa 7435->7436 7437 aa3e47 GetVolumeInformationA 7436->7437 7438 aa3e7a 7437->7438 7439 aa3f25 7438->7439 7440 aa3eb5 96 API calls 7438->7440 7441 aa3f4f 7439->7441 7442 aa3f31 CreateThread CloseHandle 7439->7442 7443 aa3ea9 7440->7443 7444 aa3f60 43 API calls 7441->7444 7442->7441 7443->7439 7445 aa3f14 7443->7445 7447 aa3eca GetModuleFileNameA wsprintfA 7443->7447 7446 aa3f54 7444->7446 7445->7439 7449 aa3405 5 API calls 7445->7449 7448 aa10ce 2 API calls 7446->7448 7447->7445 7450 aa3f7e 7448->7450 7449->7439 7451 aa3f8f 23 API calls 7450->7451 7452 aa3f83 7451->7452 7453 aa3ffa CreateEventA 7452->7453 7454 aa3fd3 CreateThread CloseHandle 7452->7454 7457 aa4012 7453->7457 7454->7453 7455 aa4056 lstrlen 7455->7455 7456 aa4065 gethostbyname 7455->7456 7456->7457 7457->7455 7457->7456 7458 aa4081 socket 7457->7458 7459 aa4320 RtlExitUserThread 7457->7459 7461 aa42d0 SetEvent 7457->7461 7462 aa42f2 Sleep ResetEvent 7457->7462 7463 aa42b7 closesocket 7457->7463 7464 aa40ef GetVersionExA 7457->7464 7465 aa4172 wsprintfA 7457->7465 7466 aa41a7 CreateThread CloseHandle 7457->7466 7467 aa41f6 GetTickCount 7457->7467 7468 aa4288 Sleep 7457->7468 7458->7457 7460 aa40a6 connect 7458->7460 7460->7457 7460->7463 7461->7457 7462->7457 7463->7457 7464->7457 7465->7457 7466->7457 7467->7457 7468->7457 7469 aa4294 GetTickCount 7468->7469 7469->7457 6319 aa13ba 6322 aa1347 6319->6322 6320 aa142f LookupPrivilegeValueA NtAdjustPrivilegesToken 6321 aa1403 6322->6320 6322->6321 7029 aa443b 7032 aa144a LookupPrivilegeValueA NtAdjustPrivilegesToken 7029->7032 7031 aa4441 7032->7031 6471 aa02fe 6472 aa0415 6471->6472 6474 aa042d 6472->6474 6503 aa10ce 6474->6503 6476 aa048f 6477 aa04dd 6476->6477 6478 aa04b0 GetModuleHandleA 6476->6478 6479 aa04f8 GetVersion 6477->6479 6478->6477 6480 aa050f VirtualAlloc 6479->6480 6501 aa05ca 6479->6501 6481 aa05a9 CloseHandle 6480->6481 6484 aa0532 6480->6484 6481->6501 6482 aa05d3 SetProcessAffinityMask 6510 aa05f2 GetModuleHandleA 6482->6510 6484->6481 6507 aa05ba 6484->6507 6485 aa06fc lstrcpyW 6533 aa24ae lstrcpyW lstrlenW 6485->6533 6487 aa074c NtMapViewOfSection 6487->6481 6487->6501 6488 aa0717 GetPEB lstrcpyW lstrcatW 6489 aa24ae 3 API calls 6488->6489 6489->6501 6491 aa0780 NtOpenProcessToken 6492 aa07c5 CreateToolhelp32Snapshot Process32First 6491->6492 6491->6501 6493 aa07eb Process32Next 6492->6493 6494 aa0865 CloseHandle 6493->6494 6493->6501 6494->6481 6496 aa07fd OpenProcess 6496->6493 6496->6501 6498 aa07b7 CreateToolhelp32Snapshot Process32First 6498->6493 6499 aa085c CloseHandle 6499->6493 6500 aa0834 CreateRemoteThread 6500->6499 6500->6501 6501->6481 6501->6482 6501->6485 6501->6487 6501->6488 6501->6491 6501->6493 6501->6496 6501->6498 6501->6499 6501->6500 6502 aa05ba Sleep 6501->6502 6536 aa07ac 6501->6536 6560 aa2574 6501->6560 6502->6499 6505 aa10db 6503->6505 6504 aa115c 6504->6476 6505->6503 6505->6504 6506 aa1133 GetModuleHandleA GetProcAddress 6505->6506 6506->6505 6508 aa05c9 6507->6508 6509 aa05bf Sleep 6507->6509 6508->6481 6509->6507 6511 aa10ce 2 API calls 6510->6511 6523 aa05ca 6511->6523 6512 aa05a9 CloseHandle 6512->6523 6513 aa05d3 SetProcessAffinityMask 6514 aa05f2 30 API calls 6513->6514 6514->6523 6515 aa06fc lstrcpyW 6516 aa24ae 3 API calls 6515->6516 6516->6523 6517 aa074c NtMapViewOfSection 6517->6512 6517->6523 6518 aa0717 GetPEB lstrcpyW lstrcatW 6519 aa24ae 3 API calls 6518->6519 6519->6523 6520 aa0780 NtOpenProcessToken 6521 aa07c5 CreateToolhelp32Snapshot Process32First 6520->6521 6520->6523 6522 aa07eb Process32Next 6521->6522 6522->6523 6524 aa0865 CloseHandle 6522->6524 6523->6512 6523->6513 6523->6515 6523->6517 6523->6518 6523->6520 6523->6522 6525 aa07ac 30 API calls 6523->6525 6526 aa07fd OpenProcess 6523->6526 6527 aa2574 5 API calls 6523->6527 6528 aa07b7 CreateToolhelp32Snapshot Process32First 6523->6528 6529 aa085c CloseHandle 6523->6529 6530 aa0834 CreateRemoteThread 6523->6530 6524->6512 6525->6523 6526->6522 6526->6523 6527->6523 6528->6522 6529->6522 6530->6529 6531 aa084d 6530->6531 6532 aa05ba Sleep 6531->6532 6532->6529 6534 aa69f1 6533->6534 6535 aa24ea NtCreateSection 6534->6535 6535->6501 6579 aa144a LookupPrivilegeValueA NtAdjustPrivilegesToken 6536->6579 6538 aa07b2 FreeLibrary CloseHandle 6539 aa07c5 CreateToolhelp32Snapshot Process32First 6538->6539 6540 aa07eb Process32Next 6539->6540 6541 aa0865 CloseHandle 6540->6541 6547 aa05ca 6540->6547 6542 aa05a9 CloseHandle 6541->6542 6542->6547 6543 aa07fd OpenProcess 6543->6540 6543->6547 6544 aa05d3 SetProcessAffinityMask 6546 aa05f2 29 API calls 6544->6546 6545 aa2574 5 API calls 6545->6547 6546->6547 6547->6540 6547->6542 6547->6543 6547->6544 6547->6545 6548 aa085c CloseHandle 6547->6548 6549 aa0834 CreateRemoteThread 6547->6549 6552 aa06fc lstrcpyW 6547->6552 6554 aa074c NtMapViewOfSection 6547->6554 6555 aa0717 GetPEB lstrcpyW lstrcatW 6547->6555 6557 aa0780 NtOpenProcessToken 6547->6557 6558 aa07ac 29 API calls 6547->6558 6559 aa07b7 CreateToolhelp32Snapshot Process32First 6547->6559 6548->6540 6549->6548 6550 aa084d 6549->6550 6551 aa05ba Sleep 6550->6551 6551->6548 6553 aa24ae 3 API calls 6552->6553 6553->6547 6554->6542 6554->6547 6556 aa24ae 3 API calls 6555->6556 6556->6547 6557->6539 6557->6547 6558->6547 6559->6540 6580 aa252f NtOpenSection 6560->6580 6562 aa257c 6563 aa2582 NtMapViewOfSection CloseHandle 6562->6563 6564 aa2661 6562->6564 6563->6564 6567 aa25ba 6563->6567 6564->6501 6565 aa25ef 6582 aa2477 NtProtectVirtualMemory NtWriteVirtualMemory 6565->6582 6567->6565 6581 aa2477 NtProtectVirtualMemory NtWriteVirtualMemory 6567->6581 6568 aa2600 6583 aa2477 NtProtectVirtualMemory NtWriteVirtualMemory 6568->6583 6571 aa2611 6584 aa2477 NtProtectVirtualMemory NtWriteVirtualMemory 6571->6584 6573 aa2622 6574 aa2637 6573->6574 6585 aa2477 NtProtectVirtualMemory NtWriteVirtualMemory 6573->6585 6576 aa264c 6574->6576 6586 aa2477 NtProtectVirtualMemory NtWriteVirtualMemory 6574->6586 6576->6564 6587 aa2477 NtProtectVirtualMemory NtWriteVirtualMemory 6576->6587 6579->6538 6580->6562 6581->6565 6582->6568 6583->6571 6584->6573 6585->6574 6586->6576 6587->6564 6323 7fe402fe 6324 7fe40415 6323->6324 6326 7fe4042d 6324->6326 6357 7fe410ce 6326->6357 6328 7fe404dd 6331 7fe404f8 GetVersion 6328->6331 6329 7fe4048f 6329->6328 6330 7fe404b0 GetModuleHandleA 6329->6330 6330->6328 6332 7fe4050f VirtualAlloc 6331->6332 6333 7fe405ca 6331->6333 6334 7fe405a9 CloseHandle 6332->6334 6339 7fe40532 6332->6339 6333->6334 6335 7fe405d3 SetProcessAffinityMask 6333->6335 6337 7fe405f2 GetModuleHandleA 6334->6337 6364 7fe405f2 GetModuleHandleA 6335->6364 6338 7fe410ce 2 API calls 6337->6338 6355 7fe405ec 6338->6355 6339->6334 6361 7fe405ba 6339->6361 6340 7fe406fc lstrcpyW 6383 7fe424ae lstrcpyW lstrlenW 6340->6383 6343 7fe40717 GetPEB lstrcpyW lstrcatW 6345 7fe424ae 3 API calls 6343->6345 6344 7fe4074c NtMapViewOfSection 6344->6334 6344->6355 6345->6355 6346 7fe40780 NtOpenProcessToken 6347 7fe407c5 CreateToolhelp32Snapshot Process32First 6346->6347 6346->6355 6347->6355 6348 7fe407eb Process32Next 6351 7fe40865 CloseHandle 6348->6351 6348->6355 6351->6334 6352 7fe407fd OpenProcess 6352->6348 6352->6355 6353 7fe4085c CloseHandle 6353->6348 6354 7fe40834 CreateRemoteThread 6354->6353 6354->6355 6355->6334 6355->6340 6355->6343 6355->6344 6355->6346 6355->6347 6355->6348 6355->6352 6355->6353 6355->6354 6356 7fe405ba Sleep 6355->6356 6386 7fe407ac 6355->6386 6408 7fe42574 6355->6408 6356->6353 6358 7fe410db 6357->6358 6358->6357 6359 7fe4115c 6358->6359 6360 7fe41133 GetModuleHandleA GetProcAddress 6358->6360 6359->6329 6360->6358 6362 7fe405bf Sleep 6361->6362 6363 7fe405c9 6361->6363 6362->6361 6363->6334 6365 7fe410ce 2 API calls 6364->6365 6368 7fe4060e 6365->6368 6366 7fe405a9 CloseHandle 6366->6364 6367 7fe406fc lstrcpyW 6369 7fe424ae 3 API calls 6367->6369 6368->6366 6368->6367 6370 7fe40717 GetPEB lstrcpyW lstrcatW 6368->6370 6371 7fe4074c NtMapViewOfSection 6368->6371 6373 7fe40780 NtOpenProcessToken 6368->6373 6374 7fe407c5 CreateToolhelp32Snapshot Process32First 6368->6374 6375 7fe407eb Process32Next 6368->6375 6376 7fe42574 5 API calls 6368->6376 6377 7fe407ac 30 API calls 6368->6377 6379 7fe407fd OpenProcess 6368->6379 6380 7fe4085c CloseHandle 6368->6380 6381 7fe40834 CreateRemoteThread 6368->6381 6382 7fe405ba Sleep 6368->6382 6369->6368 6372 7fe424ae 3 API calls 6370->6372 6371->6366 6371->6368 6372->6368 6373->6368 6373->6374 6374->6368 6375->6368 6378 7fe40865 CloseHandle 6375->6378 6376->6368 6377->6368 6378->6366 6379->6368 6379->6375 6380->6375 6381->6368 6381->6380 6382->6380 6384 7fe469f1 6383->6384 6385 7fe424ea NtCreateSection 6384->6385 6385->6355 6427 7fe4144a LookupPrivilegeValueA NtAdjustPrivilegesToken 6386->6427 6388 7fe407b2 FreeLibrary CloseHandle 6389 7fe407c5 CreateToolhelp32Snapshot Process32First 6388->6389 6398 7fe4060e 6389->6398 6390 7fe407eb Process32Next 6392 7fe40865 CloseHandle 6390->6392 6390->6398 6391 7fe42574 5 API calls 6391->6398 6393 7fe405a9 CloseHandle 6392->6393 6397 7fe405f2 GetModuleHandleA 6393->6397 6394 7fe407fd OpenProcess 6394->6390 6394->6398 6395 7fe4085c CloseHandle 6395->6390 6396 7fe40834 CreateRemoteThread 6396->6395 6396->6398 6399 7fe410ce 2 API calls 6397->6399 6398->6389 6398->6390 6398->6391 6398->6393 6398->6394 6398->6395 6398->6396 6400 7fe405ba Sleep 6398->6400 6401 7fe406fc lstrcpyW 6398->6401 6403 7fe40717 GetPEB lstrcpyW lstrcatW 6398->6403 6404 7fe4074c NtMapViewOfSection 6398->6404 6406 7fe40780 NtOpenProcessToken 6398->6406 6407 7fe407ac 13 API calls 6398->6407 6399->6398 6400->6395 6402 7fe424ae 3 API calls 6401->6402 6402->6398 6405 7fe424ae 3 API calls 6403->6405 6404->6393 6404->6398 6405->6398 6406->6389 6406->6398 6407->6398 6428 7fe4252f NtOpenSection 6408->6428 6410 7fe4257c 6411 7fe42661 6410->6411 6412 7fe42582 NtMapViewOfSection CloseHandle 6410->6412 6411->6355 6412->6411 6414 7fe425ba 6412->6414 6413 7fe425ef 6430 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 6413->6430 6414->6413 6429 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 6414->6429 6417 7fe42600 6431 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 6417->6431 6419 7fe42611 6432 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 6419->6432 6421 7fe42622 6422 7fe42637 6421->6422 6433 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 6421->6433 6424 7fe4264c 6422->6424 6434 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 6422->6434 6424->6411 6435 7fe42477 NtProtectVirtualMemory NtWriteVirtualMemory 6424->6435 6427->6388 6428->6410 6429->6413 6430->6417 6431->6419 6432->6421 6433->6422 6434->6424 6435->6411 7473 7fe4443b 7476 7fe4144a LookupPrivilegeValueA NtAdjustPrivilegesToken 7473->7476 7475 7fe44441 7476->7475 6436 aa3888 6438 aa388e GetSystemTime 6436->6438 6439 aa38d2 6438->6439 6440 aa390c Sleep 6439->6440 6441 aa3a32 6439->6441 6442 aa3924 InternetGetConnectedState 6439->6442 6443 aa3954 gethostbyname 6439->6443 6446 aa3a1f closesocket 6439->6446 6440->6439 6442->6439 6443->6439 6444 aa397a socket 6443->6444 6444->6439 6445 aa3990 ioctlsocket connect Sleep 6444->6445 6445->6439 6446->6439 6588 aa0fcf 6591 aa10a0 6588->6591 6589 aa115c 6590 aa1133 GetModuleHandleA GetProcAddress 6590->6591 6591->6589 6591->6590 7033 aa0000 7034 aa0004 7033->7034 7035 aa00a1 7034->7035 7037 aa025e 7034->7037 7041 aa0105 7037->7041 7040 aa0278 7040->7035 7042 aa0116 GetPEB 7041->7042 7042->7040 6603 7fe41196 GetProcAddress 6451 aa3399 6453 aa33a2 6451->6453 6454 aa33a9 Sleep 6453->6454 6454->6454 7043 aa3819 7045 aa381f WaitForSingleObject 7043->7045 7046 aa383b closesocket 7045->7046 7047 aa3845 7045->7047 7046->7047

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 0 aa042d-aa04a4 call aa10ce 3 aa04dd 0->3 4 aa04a6-aa04db call aa273c GetModuleHandleA 0->4 6 aa04e4-aa0509 call aa2750 GetVersion 3->6 4->6 10 aa05ca-aa05d1 6->10 11 aa050f-aa0530 VirtualAlloc 6->11 12 aa05a9-aa05b3 CloseHandle 10->12 14 aa05d3-aa05fc SetProcessAffinityMask call aa05f2 10->14 11->12 13 aa0532-aa0562 call aa0305 11->13 12->10 13->12 24 aa0564-aa057b 13->24 19 aa05fe-aa061c 14->19 20 aa0621-aa0623 14->20 19->20 22 aa064c-aa0652 20->22 23 aa0625-aa0630 20->23 22->12 27 aa0658-aa0671 22->27 25 aa0639-aa0648 23->25 26 aa0632 23->26 24->12 31 aa057d-aa05a4 call aa05ba 24->31 25->22 26->25 27->12 28 aa0677-aa0690 27->28 28->12 30 aa0696-aa069c 28->30 32 aa06d8-aa06de 30->32 33 aa069e-aa06b1 30->33 31->12 34 aa06fc-aa0715 lstrcpyW call aa24ae 32->34 35 aa06e0-aa06f3 32->35 33->12 36 aa06b7-aa06bd 33->36 42 aa074c-aa0775 NtMapViewOfSection 34->42 43 aa0717-aa0746 GetPEB lstrcpyW lstrcatW call aa24ae 34->43 35->34 38 aa06f5 35->38 36->32 37 aa06bf-aa06d2 36->37 37->12 37->32 38->34 42->12 46 aa077b-aa078f call aa0305 NtOpenProcessToken 42->46 43->12 43->42 51 aa0791-aa07a3 call aa115d call aa07ac 46->51 52 aa07c5-aa07e4 CreateToolhelp32Snapshot Process32First 46->52 62 aa080e-aa080f 51->62 63 aa07a5 51->63 53 aa07eb-aa07f5 Process32Next 52->53 56 aa07f7-aa07fb 53->56 57 aa0865-aa0872 CloseHandle 53->57 56->53 59 aa07fd-aa080d OpenProcess 56->59 57->12 59->53 61 aa080f 59->61 64 aa0810-aa0818 call aa2574 61->64 62->64 63->64 65 aa07a7-aa07e4 CreateToolhelp32Snapshot Process32First 63->65 69 aa081a-aa0820 64->69 70 aa085c-aa0863 CloseHandle 64->70 65->53 69->70 71 aa0822-aa0832 69->71 70->53 71->70 72 aa0834-aa084b CreateRemoteThread 71->72 72->70 73 aa084d-aa0857 call aa05ba 72->73 73->70
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 00AA04BE
                                                                                                                      • GetVersion.KERNEL32 ref: 00AA0500
                                                                                                                      • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 00AA0528
                                                                                                                      • CloseHandle.KERNELBASE(?), ref: 00AA05AD
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$AllocCloseModuleVersionVirtual
                                                                                                                      • String ID: \BaseNamedObjects\tputVt$\BaseNamedObjects\tputVt$csrs
                                                                                                                      • API String ID: 3017432202-3247437241
                                                                                                                      • Opcode ID: 43ec0803d0a0dafcaea35956b0059ac1bcfa55dd341d92edebfb48273f019b49
                                                                                                                      • Instruction ID: 27225b2e9173ce1f7a9b751ffe59a3dc6067c7b38158881fd5a7cf341c89d9c7
                                                                                                                      • Opcode Fuzzy Hash: 43ec0803d0a0dafcaea35956b0059ac1bcfa55dd341d92edebfb48273f019b49
                                                                                                                      • Instruction Fuzzy Hash: 59B1AA71A05249FFEB229F24C80AFAA3BA9EF46311F104028F9099F1C1C7F49F558B59

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 75 aa05f2-aa0615 GetModuleHandleA call aa10ce 78 aa05a9-aa05b3 CloseHandle 75->78 79 aa0617-aa0630 75->79 82 aa05ca-aa05d1 78->82 80 aa0639-aa0648 79->80 81 aa0632 79->81 83 aa064c-aa0652 80->83 81->80 82->78 84 aa05d3-aa05fc SetProcessAffinityMask call aa05f2 82->84 83->78 85 aa0658-aa0671 83->85 90 aa05fe-aa061c 84->90 91 aa0621-aa0623 84->91 85->78 87 aa0677-aa0690 85->87 87->78 89 aa0696-aa069c 87->89 92 aa06d8-aa06de 89->92 93 aa069e-aa06b1 89->93 90->91 91->83 96 aa0625-aa0630 91->96 94 aa06fc-aa0715 lstrcpyW call aa24ae 92->94 95 aa06e0-aa06f3 92->95 93->78 97 aa06b7-aa06bd 93->97 102 aa074c-aa0775 NtMapViewOfSection 94->102 103 aa0717-aa0746 GetPEB lstrcpyW lstrcatW call aa24ae 94->103 95->94 99 aa06f5 95->99 96->80 96->81 97->92 98 aa06bf-aa06d2 97->98 98->78 98->92 99->94 102->78 105 aa077b-aa078f call aa0305 NtOpenProcessToken 102->105 103->78 103->102 109 aa0791-aa07a3 call aa115d call aa07ac 105->109 110 aa07c5-aa07e4 CreateToolhelp32Snapshot Process32First 105->110 120 aa080e-aa080f 109->120 121 aa07a5 109->121 111 aa07eb-aa07f5 Process32Next 110->111 114 aa07f7-aa07fb 111->114 115 aa0865-aa0872 CloseHandle 111->115 114->111 117 aa07fd-aa080d OpenProcess 114->117 115->78 117->111 119 aa080f 117->119 122 aa0810-aa0818 call aa2574 119->122 120->122 121->122 123 aa07a7-aa07e4 CreateToolhelp32Snapshot Process32First 121->123 127 aa081a-aa0820 122->127 128 aa085c-aa0863 CloseHandle 122->128 123->111 127->128 129 aa0822-aa0832 127->129 128->111 129->128 130 aa0834-aa084b CreateRemoteThread 129->130 130->128 131 aa084d-aa0857 call aa05ba 130->131 131->128
                                                                                                                      APIs
                                                                                                                      • CloseHandle.KERNELBASE(?), ref: 00AA05AD
                                                                                                                      • GetModuleHandleA.KERNEL32(00AA05EC), ref: 00AA05F2
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tputVt,\BaseNamedObjects\tputVt,?,?,?,?), ref: 00AA070A
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tputVt,?), ref: 00AA072D
                                                                                                                      • lstrcatW.KERNEL32(\BaseNamedObjects\tputVt,\tputVt), ref: 00AA073B
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 00AA076B
                                                                                                                      • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 00AA0786
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA07C9
                                                                                                                      • Process32First.KERNEL32 ref: 00AA07DC
                                                                                                                      • Process32Next.KERNEL32 ref: 00AA07ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA0805
                                                                                                                      • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00AA0842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 00AA086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                                                                                                      • String ID: \BaseNamedObjects\tputVt$\BaseNamedObjects\tputVt$csrs
                                                                                                                      • API String ID: 1545766225-3247437241
                                                                                                                      • Opcode ID: a0a38d7378b868c1c70dcdbeac2eb480934ad4b5eff30f61bc7bace271459fa5
                                                                                                                      • Instruction ID: ab4a6eb41309c17a8bb9767f477bf019a1deef3ecd54addba5c22e7ae012fc64
                                                                                                                      • Opcode Fuzzy Hash: a0a38d7378b868c1c70dcdbeac2eb480934ad4b5eff30f61bc7bace271459fa5
                                                                                                                      • Instruction Fuzzy Hash: C6718832605209FFEB219F10C84AFAE3BADEF4A315F144028E9099F0D1C7B59F559B99

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 190 aa116f-aa1187 LoadLibraryA call aa1196 193 aa1189 190->193 194 aa11f2 190->194 195 aa11f4-aa11f8 193->195 196 aa118b-aa1192 193->196 194->195 197 aa11f9-aa120f 195->197 196->197 198 aa1194-aa11a0 196->198 199 aa11ef 197->199 200 aa1211-aa1215 197->200 201 aa11c9-aa11d8 198->201 202 aa11a2-aa11b9 198->202 205 aa125f-aa126a 199->205 206 aa11f1 199->206 207 aa127f-aa1286 200->207 208 aa1216-aa121e 200->208 211 aa11bb-aa11c7 201->211 216 aa11da-aa11dc 201->216 202->211 213 aa126b-aa1272 205->213 206->194 214 aa1287-aa129e 207->214 209 aa11e0-aa11ec 208->209 210 aa1220-aa1230 208->210 209->199 223 aa1237-aa123a 210->223 211->201 217 aa1273 213->217 222 aa129f-aa12a4 214->222 216->209 217->208 220 aa1275 217->220 224 aa123c-aa125c 220->224 225 aa1277 220->225 226 aa12a7-aa12aa 222->226 223->224 224->205 227 aa12ab-aa12b2 226->227 227->227 229 aa12b4-aa12b5 227->229 229->223 230 aa12b7-aa12b9 229->230 231 aa131b-aa131e 230->231 232 aa12bb-aa12bd 230->232 235 aa1339 231->235 236 aa131f-aa1321 231->236 233 aa12ff-aa1301 232->233 234 aa12bf-aa12c1 232->234 239 aa1302 233->239 240 aa1333-aa1338 233->240 234->217 241 aa12c3 234->241 237 aa136b-aa136e 235->237 238 aa133b-aa133d 235->238 242 aa1322-aa1325 236->242 243 aa1383-aa138f 236->243 250 aa1374-aa1375 237->250 238->236 244 aa133f-aa1341 238->244 246 aa1303-aa1305 239->246 240->235 241->231 247 aa12c5 241->247 248 aa1357 242->248 249 aa1327-aa1329 242->249 245 aa1393-aa1396 243->245 244->245 251 aa1343 244->251 252 aa1397-aa139a 245->252 246->214 253 aa1307-aa130d 246->253 247->226 254 aa12c7-aa12c9 247->254 255 aa135b-aa135d 248->255 256 aa137b-aa137d 249->256 257 aa132b-aa1331 249->257 258 aa1347-aa1349 250->258 259 aa1377-aa137a 250->259 262 aa139b 251->262 263 aa1345 251->263 252->262 253->222 266 aa130f-aa1311 253->266 254->257 267 aa12cb-aa12ce 254->267 268 aa13cf-aa13d1 255->268 269 aa135f-aa1361 255->269 260 aa137f-aa1382 256->260 261 aa13ed 256->261 257->240 257->246 264 aa13bb-aa13c5 258->264 265 aa134b-aa134e 258->265 259->256 260->243 261->260 279 aa13ef-aa13f5 261->279 262->250 270 aa139d-aa13a1 262->270 263->253 263->258 272 aa13a7-aa13af 264->272 273 aa13c7-aa13cd 264->273 271 aa1353-aa1355 265->271 266->246 274 aa1313-aa1319 266->274 277 aa12cf-aa12d1 267->277 275 aa1403-aa140a 268->275 276 aa13d3-aa13d5 268->276 269->271 278 aa1363-aa1367 269->278 281 aa13a3-aa13a6 270->281 271->259 282 aa1356 271->282 272->264 273->268 289 aa142f-aa1474 LookupPrivilegeValueA NtAdjustPrivilegesToken 273->289 274->231 274->232 284 aa13e7-aa13ec 276->284 285 aa13d7-aa13e5 276->285 277->246 286 aa12d3-aa12d9 277->286 278->237 279->252 288 aa13f7-aa1401 279->288 281->272 282->248 284->261 285->284 285->288 286->213 291 aa12db-aa12e1 286->291 288->275 288->281 293 aa12f3-aa12f9 291->293 294 aa12e3-aa12e9 291->294 293->255 295 aa12fb-aa12fe 293->295 294->255 296 aa12eb-aa12ed 294->296 295->233 296->277 297 aa12ef-aa12f2 296->297 297->293
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AA1162,00AA0796,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA116F
                                                                                                                        • Part of subcall function 00AA1196: GetProcAddress.KERNEL32(00000000,00AA1180), ref: 00AA1197
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressLibraryLoadProc
                                                                                                                      • String ID: \tputVt
                                                                                                                      • API String ID: 2574300362-2766679152
                                                                                                                      • Opcode ID: 60c08aa42c25ea88f928a9d1c29bc0f36a0e3273d1dbb643ee977a8405c06a08
                                                                                                                      • Instruction ID: 2e6dea318b6f737fe46a522a606f6933cd7a4f81a1094f5f8a699e084343e6ae
                                                                                                                      • Opcode Fuzzy Hash: 60c08aa42c25ea88f928a9d1c29bc0f36a0e3273d1dbb643ee977a8405c06a08
                                                                                                                      • Instruction Fuzzy Hash: 97B15521458AD17BCF63CF3488959EABFB1EE63B60F48469DE5C04F8D3D351A90683A1

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 323 aa252f-aa2573 NtOpenSection
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,0000000E), ref: 00AA255E
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tputVt, xrefs: 00AA254B
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: OpenSection
                                                                                                                      • String ID: \BaseNamedObjects\tputVt
                                                                                                                      • API String ID: 1950954290-2261315748
                                                                                                                      • Opcode ID: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                                                                                                      • Instruction ID: cc492c20b74137972e1aeb42a549193fdcd5baff80c1f90c3202c4eb3a6ea2fd
                                                                                                                      • Opcode Fuzzy Hash: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                                                                                                      • Instruction Fuzzy Hash: A1E0DFF1342105BAFB288B19CC07FB7220DCBC0600F048604F918DA090E6F4AF104278

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 324 aa2574-aa257c call aa252f 327 aa2582-aa25b4 NtMapViewOfSection CloseHandle 324->327 328 aa2661-aa2664 324->328 327->328 329 aa25ba-aa25c0 327->329 330 aa25ce-aa25d8 329->330 331 aa25c2-aa25cb 329->331 332 aa25da-aa25e2 330->332 333 aa25ef-aa262a call aa2477 * 3 330->333 331->330 332->333 335 aa25e4-aa25ea call aa2477 332->335 342 aa262c-aa2632 call aa2477 333->342 343 aa2637-aa263f 333->343 335->333 342->343 345 aa264c-aa2654 343->345 346 aa2641-aa2647 call aa2477 343->346 345->328 348 aa2656-aa265c call aa2477 345->348 346->345 348->328
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 00AA252F: NtOpenSection.NTDLL(?,0000000E), ref: 00AA255E
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000B7C4,00000000,?,00000002,00100000,00000040), ref: 00AA25A4
                                                                                                                      • CloseHandle.KERNELBASE(00000000,0000B7C4,00000000,?,00000002,00100000,00000040,00000000,0000B7C4,00000000,?,00AA0815), ref: 00AA25AC
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Section$CloseHandleOpenView
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 2731707328-0
                                                                                                                      • Opcode ID: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                                                                                                      • Instruction ID: 0a1df78cb6ed2ad5636a6c5b2f9ae867b4f5a90d134c5f1cc5141357611e176e
                                                                                                                      • Opcode Fuzzy Hash: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                                                                                                      • Instruction Fuzzy Hash: 77210770300646ABEB28DF69CC56FAA7369EF82744F400118F8198F1D4DBB1AE24C718

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 350 aa1422-aa1474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                                                                                                      APIs
                                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 00AA145A
                                                                                                                      • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 00AA146A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3615134276-0
                                                                                                                      • Opcode ID: a37aca55b8afbb6b8d0cee772d19627416255012f83b142472a08d4b437a2e1f
                                                                                                                      • Instruction ID: ddbff97e699881e74d61e2820170bd54818263a6fff0c1519b9bac5ac29647fb
                                                                                                                      • Opcode Fuzzy Hash: a37aca55b8afbb6b8d0cee772d19627416255012f83b142472a08d4b437a2e1f
                                                                                                                      • Instruction Fuzzy Hash: 5BF0AE36542510BBD7205F56CD8EED77F28EF533A0F144556F4484E151C2624BA5D3F4

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 352 aa2477-aa24ad NtProtectVirtualMemory NtWriteVirtualMemory
                                                                                                                      APIs
                                                                                                                      • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 00AA249B
                                                                                                                      • NtWriteVirtualMemory.NTDLL ref: 00AA24A4
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: MemoryVirtual$ProtectWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 151266762-0
                                                                                                                      • Opcode ID: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                                                                                                      • Instruction ID: 6bbb67ea70d6ee96dfa5f1d7b4d314b28acc786a60d934acbd3f762ecc45b662
                                                                                                                      • Opcode Fuzzy Hash: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                                                                                                      • Instruction Fuzzy Hash: 2AE012E07502007FF5185F55DC5FF7B391DDB41751F410208FA0A981C4F9A15E18467A

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 353 aa144a-aa1474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                                                                                                      APIs
                                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 00AA145A
                                                                                                                      • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 00AA146A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3615134276-0
                                                                                                                      • Opcode ID: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                                                                                                      • Instruction ID: ee32c209e3d0a2de55b6acbdbca8a3d00d8b73f2470e3acbbab87dcaf3c2c19a
                                                                                                                      • Opcode Fuzzy Hash: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                                                                                                      • Instruction Fuzzy Hash: F2D06731643034BBD6312A568C0EEE77D1DEF577A0F015041F9089A1A1C5A28EA1C7F5

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 133 aa07ac-aa07bf call aa144a FreeLibrary CloseHandle 136 aa07c5-aa07e4 CreateToolhelp32Snapshot Process32First 133->136 137 aa07eb-aa07f5 Process32Next 136->137 138 aa07f7-aa07fb 137->138 139 aa0865-aa0872 CloseHandle 137->139 138->137 141 aa07fd-aa080d OpenProcess 138->141 140 aa05a9-aa05d1 CloseHandle 139->140 145 aa05d3-aa05fc SetProcessAffinityMask call aa05f2 140->145 141->137 142 aa080f 141->142 144 aa0810-aa0818 call aa2574 142->144 150 aa081a-aa0820 144->150 151 aa085c-aa0863 CloseHandle 144->151 152 aa05fe-aa061c 145->152 153 aa0621-aa0623 145->153 150->151 154 aa0822-aa0832 150->154 151->137 152->153 155 aa064c-aa0652 153->155 156 aa0625-aa0630 153->156 154->151 157 aa0834-aa084b CreateRemoteThread 154->157 155->140 161 aa0658-aa0671 155->161 159 aa0639-aa0648 156->159 160 aa0632 156->160 157->151 158 aa084d-aa0857 call aa05ba 157->158 158->151 159->155 160->159 161->140 163 aa0677-aa0690 161->163 163->140 164 aa0696-aa069c 163->164 165 aa06d8-aa06de 164->165 166 aa069e-aa06b1 164->166 167 aa06fc-aa0715 lstrcpyW call aa24ae 165->167 168 aa06e0-aa06f3 165->168 166->140 169 aa06b7-aa06bd 166->169 174 aa074c-aa0775 NtMapViewOfSection 167->174 175 aa0717-aa0746 GetPEB lstrcpyW lstrcatW call aa24ae 167->175 168->167 171 aa06f5 168->171 169->165 170 aa06bf-aa06d2 169->170 170->140 170->165 171->167 174->140 177 aa077b-aa078f call aa0305 NtOpenProcessToken 174->177 175->140 175->174 177->136 181 aa0791-aa07a3 call aa115d call aa07ac 177->181 186 aa080e-aa080f 181->186 187 aa07a5 181->187 186->144 187->144 188 aa07a7-aa07e4 CreateToolhelp32Snapshot Process32First 187->188 188->137
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 00AA144A: LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 00AA145A
                                                                                                                        • Part of subcall function 00AA144A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 00AA146A
                                                                                                                      • CloseHandle.KERNELBASE(?), ref: 00AA05AD
                                                                                                                      • FreeLibrary.KERNEL32(75670000,?,00AA079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA07B8
                                                                                                                      • CloseHandle.KERNELBASE(?,?,00AA079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA07BF
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA07C9
                                                                                                                      • Process32First.KERNEL32 ref: 00AA07DC
                                                                                                                      • Process32Next.KERNEL32 ref: 00AA07ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA0805
                                                                                                                      • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00AA0842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00AA085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 00AA086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                                                                                                      • String ID: csrs
                                                                                                                      • API String ID: 3908997113-2321902090
                                                                                                                      • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction ID: 8d5e3ab4414ff2dfe575c99e9aadfff08d388ec98e39153f9fbfe167d061c0cd
                                                                                                                      • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction Fuzzy Hash: C8113030501205BBEB255F21CD49FBF3A6DEF46701F00002CFD4ADA081D7B49F019A6A

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 298 7fe44499-7fe444a1 299 7fe444a3-7fe444ad 298->299 300 7fe444c8-7fe44504 CreateFileA 298->300 299->300 305 7fe444af-7fe444c0 299->305 307 7fe44506-7fe4451f 300->307 308 7fe44527-7fe4454d 300->308 305->300 310 7fe444c2 305->310 307->308 313 7fe44521 307->313 315 7fe4454f-7fe44556 308->315 316 7fe44558-7fe44582 CreateFileMappingA 308->316 310->300 313->308 315->316 319 7fe44584-7fe4458b 316->319 320 7fe4458d-7fe445a2 MapViewOfFile 316->320 319->320 322 7fe445a8-7fe445ae 320->322
                                                                                                                      APIs
                                                                                                                      • CreateFileA.KERNELBASE(?,C0000000,00000001,00000000,00000003,00000000,00000000,?,65676E61,?,?,7FE44406,?,7FE443E8,?,7FE443C4), ref: 7FE444ED
                                                                                                                      • CreateFileMappingA.KERNEL32(?,00000000,00000004,00000000,00000000,00000000,?,C0000000,00000001,00000000,00000003,00000000,00000000,?,65676E61), ref: 7FE44565
                                                                                                                      • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000,?,C0000000,00000001,00000000,00000003,00000000,00000000,?,65676E61), ref: 7FE4459A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$Create$MappingView
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1299149932-0
                                                                                                                      • Opcode ID: a597af1445ea8736db27a55b35799f807b5cdfd84ba473e7882835a9cfdd7254
                                                                                                                      • Instruction ID: 7546c9a9d357b7e1dadf9586052fd295a6a3be759e7d42c7efdb4b51d27ad5e1
                                                                                                                      • Opcode Fuzzy Hash: a597af1445ea8736db27a55b35799f807b5cdfd84ba473e7882835a9cfdd7254
                                                                                                                      • Instruction Fuzzy Hash: 22216070305309BFEF218E619C45BBA366CAF00219F51122DFE2A9E094D7F4AF058728

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 354 aa05ba-aa05bd 355 aa05c9 354->355 356 aa05bf-aa05c7 Sleep 354->356 356->354
                                                                                                                      APIs
                                                                                                                      • Sleep.KERNELBASE(0000000A,00AA085C,?,00000000,00000000,-00003C38,00000002,00000000,?,00000000), ref: 00AA05C1
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3472027048-0
                                                                                                                      • Opcode ID: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                                                                                                      • Instruction ID: 91f970c01e068a77b02b57f156d51bc68ece8a326129f86bda64c9c3de2d5c1b
                                                                                                                      • Opcode Fuzzy Hash: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                                                                                                      • Instruction Fuzzy Hash: 28B0123864030296DA140910440DF041A347F03B11FE04059E2064E0C007E407001C09

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 359 aa3c3d-aa3c59 360 aa3c5b-aa3c63 359->360 361 aa3ca9-aa3cb3 call aa252f 359->361 362 aa3c64-aa3c67 360->362 369 aa3cfb-aa3d43 GetSystemDirectoryA call aa3d1f 361->369 370 aa3cb5-aa3cce call aa3cc2 361->370 364 aa3c69-aa3c6e 362->364 365 aa3c93 362->365 364->365 367 aa3c70-aa3c91 364->367 365->362 368 aa3c95-aa3d43 GetWindowsDirectoryA call aa3d36 365->368 367->365 380 aa3d45-aa3dc0 GetProcAddress LoadLibraryA call aa10ce call aa01cb GetTickCount call aa3b76 368->380 369->380 377 aa3cd4-aa3cdc GetProcAddress 370->377 378 aa3ccf call aa26d4 370->378 381 aa3cde 377->381 382 aa3ce0-aa3d43 call aa3cf0 377->382 378->377 391 aa3dc8-aa3dcd call aa3b76 380->391 392 aa3dc2 380->392 381->382 382->380 395 aa3dcf-aa3de6 391->395 392->391 396 aa3de8-aa3df8 call aa63a0 call aa273c 395->396 401 aa3dfa-aa3dfc 396->401 402 aa3dfe-aa3e1a call aa63a0 396->402 404 aa3e1b-aa3e1c 401->404 402->404 404->396 405 aa3e1e-aa3e24 404->405 405->395 407 aa3e26-aa3e30 call aa273c 405->407 410 aa3e3f-aa3e78 call aa273c GetVolumeInformationA 407->410 411 aa3e32-aa3e3a call aa2750 407->411 415 aa3e7a-aa3e80 410->415 416 aa3e82-aa3e88 410->416 411->410 418 aa3e91-aa3e9e 415->418 417 aa3e8a 416->417 416->418 417->418 419 aa3ea4-aa3ec3 call aa3eb5 418->419 420 aa3f25 418->420 427 aa3f1c-aa3f1e 419->427 428 aa3ec6-aa3ec8 419->428 422 aa3f2f 420->422 423 aa3f4f-aa3fd1 call aa3f60 call aa10ce call aa3f8f 422->423 424 aa3f31-aa3f49 CreateThread CloseHandle 422->424 439 aa3ffa-aa400b CreateEventA 423->439 440 aa3fd3-aa3ff8 CreateThread CloseHandle 423->440 424->423 427->420 431 aa3f20 call aa3405 427->431 428->422 430 aa3eca-aa3f14 GetModuleFileNameA wsprintfA 428->430 430->427 431->420 441 aa4012-aa402a call aa37fa 439->441 440->439 444 aa402c-aa402f 441->444 445 aa4031-aa4044 call aa3b90 441->445 444->445 447 aa404c-aa4054 444->447 451 aa404a 445->451 452 aa42be-aa42c5 445->452 449 aa4056-aa4063 lstrlen 447->449 450 aa4065-aa406e gethostbyname 447->450 449->449 449->450 453 aa4074-aa407b 450->453 454 aa4315-aa431b 450->454 455 aa4081-aa40a0 socket 451->455 456 aa4320-aa4322 RtlExitUserThread 452->456 457 aa42c7-aa42ce 452->457 453->455 454->441 455->452 458 aa40a6-aa40b9 connect 455->458 459 aa42e2-aa42e9 457->459 460 aa42d0-aa42dc SetEvent 457->460 463 aa40bf-aa416e call aa273c call aa2750 GetVersionExA call aa2750 call aa3358 call aa4178 458->463 464 aa42b7-aa42b8 closesocket 458->464 461 aa42eb 459->461 462 aa42f2-aa4310 Sleep ResetEvent 459->462 460->459 461->462 462->441 475 aa4170 463->475 476 aa4195-aa41a5 call aa3358 463->476 464->452 477 aa4192-aa4194 475->477 478 aa4172-aa418c wsprintfA 475->478 482 aa41c3-aa41ca 476->482 483 aa41a7-aa41bd CreateThread CloseHandle 476->483 477->476 478->477 480 aa418e 478->480 480->477 484 aa41d0-aa41eb 482->484 483->482 486 aa41ed-aa41f4 484->486 487 aa4210-aa4214 484->487 486->487 489 aa41f6-aa4207 GetTickCount 486->489 487->464 488 aa421a-aa421c 487->488 490 aa421e-aa4236 488->490 489->487 491 aa4209 489->491 492 aa423b-aa4243 490->492 493 aa4238 490->493 491->487 492->490 494 aa4245 492->494 493->492 495 aa424b-aa424f 494->495 496 aa4261-aa4263 495->496 497 aa4251-aa4258 call aa2f08 495->497 499 aa4265-aa426f 496->499 497->464 502 aa425a 497->502 501 aa4274-aa4282 call aa6541 call aa655b 499->501 501->484 508 aa4288-aa4292 Sleep 501->508 502->499 504 aa425c-aa425f 502->504 504->495 508->501 509 aa4294-aa42a5 GetTickCount 508->509 509->484 510 aa42ab-aa42b2 509->510 510->464 510->484
                                                                                                                      APIs
                                                                                                                      • GetWindowsDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 00AA3CA1
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 00AA3CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AA3D41), ref: 00AA3D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AA3D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AA3D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AA6EF6,00000000,00000000,00000000,00000000), ref: 00AA3E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AA3EE2
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 1749273276-1098094878
                                                                                                                      • Opcode ID: 3b3a8a3192dd475763d45222a96a185a3ef968de58b42c5bf8551b3c780efb2c
                                                                                                                      • Instruction ID: 1bb64e019010e4183f134fec110f79de46e840a913cbfd645d35f682bd941653
                                                                                                                      • Opcode Fuzzy Hash: 3b3a8a3192dd475763d45222a96a185a3ef968de58b42c5bf8551b3c780efb2c
                                                                                                                      • Instruction Fuzzy Hash: 1002C072418258BFEB219F248C4ABEA7BACEF42310F044559F9499F0C2D7F45F4987A6

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 511 7fe43c3d-7fe43c59 512 7fe43ca9-7fe43cb3 call 7fe4252f 511->512 513 7fe43c5b-7fe43c63 511->513 521 7fe43cb5-7fe43cce call 7fe43cc2 512->521 522 7fe43cfb-7fe43d43 GetSystemDirectoryA call 7fe43d1f 512->522 514 7fe43c64-7fe43c67 513->514 516 7fe43c93 514->516 517 7fe43c69-7fe43c6e 514->517 516->514 520 7fe43c95-7fe43d43 GetWindowsDirectoryA call 7fe43d36 516->520 517->516 519 7fe43c70-7fe43c91 517->519 519->516 530 7fe43d45-7fe43d72 GetProcAddress LoadLibraryA 520->530 531 7fe43cd4-7fe43cdc GetProcAddress 521->531 532 7fe43ccf call 7fe426d4 521->532 522->530 533 7fe43d7d-7fe43dc0 call 7fe401cb GetTickCount call 7fe43b76 530->533 534 7fe43d78 call 7fe410ce 530->534 535 7fe43ce0-7fe43d43 call 7fe43cf0 531->535 536 7fe43cde 531->536 532->531 543 7fe43dc2 533->543 544 7fe43dc8-7fe43dcd call 7fe43b76 533->544 534->533 535->530 536->535 543->544 547 7fe43dcf-7fe43de6 544->547 548 7fe43de8-7fe43df8 call 7fe463a0 call 7fe4273c 547->548 553 7fe43dfe-7fe43e1a call 7fe463a0 548->553 554 7fe43dfa-7fe43dfc 548->554 555 7fe43e1b-7fe43e1c 553->555 554->555 555->548 558 7fe43e1e-7fe43e24 555->558 558->547 559 7fe43e26-7fe43e30 call 7fe4273c 558->559 562 7fe43e32-7fe43e3a call 7fe42750 559->562 563 7fe43e3f-7fe43e78 call 7fe4273c GetVolumeInformationA 559->563 562->563 567 7fe43e82-7fe43e88 563->567 568 7fe43e7a-7fe43e80 563->568 569 7fe43e91-7fe43e9e 567->569 570 7fe43e8a 567->570 568->569 571 7fe43ea4-7fe43ec8 call 7fe43eb5 569->571 572 7fe43f25 569->572 570->569 574 7fe43f2f 571->574 581 7fe43eca-7fe43f1e GetModuleFileNameA wsprintfA 571->581 572->574 576 7fe43f31-7fe43f49 CreateThread CloseHandle 574->576 577 7fe43f4f-7fe43f73 call 7fe43f60 574->577 576->577 582 7fe43f7e-7fe43fad call 7fe43f8f 577->582 583 7fe43f79 call 7fe410ce 577->583 581->572 586 7fe43f20 call 7fe43405 581->586 589 7fe43fd6-7fe43ff8 CreateThread CloseHandle 582->589 590 7fe43faf-7fe43fd1 582->590 583->582 586->572 592 7fe43ffa-7fe4400b CreateEventA 589->592 591 7fe43fd3 590->591 590->592 591->589 593 7fe44012-7fe4402a call 7fe437fa 592->593 596 7fe44031-7fe44044 call 7fe43b90 593->596 597 7fe4402c-7fe4402f 593->597 603 7fe442be-7fe442c5 596->603 604 7fe4404a 596->604 597->596 598 7fe4404c-7fe44054 597->598 601 7fe44065-7fe4406e gethostbyname 598->601 602 7fe44056-7fe44063 lstrlen 598->602 605 7fe44074-7fe4407b 601->605 606 7fe44315-7fe4431b 601->606 602->601 602->602 607 7fe442c7-7fe442ce 603->607 608 7fe44320-7fe44322 RtlExitUserThread 603->608 609 7fe44081-7fe440a0 socket 604->609 605->609 606->593 611 7fe442d0-7fe442dc SetEvent 607->611 612 7fe442e2-7fe442e9 607->612 609->603 610 7fe440a6-7fe440b9 connect 609->610 613 7fe442b7-7fe442b8 closesocket 610->613 614 7fe440bf-7fe4416e call 7fe4273c call 7fe42750 GetVersionExA call 7fe42750 call 7fe43358 call 7fe44178 610->614 611->612 615 7fe442f2-7fe44310 Sleep ResetEvent 612->615 616 7fe442eb 612->616 613->603 627 7fe44195-7fe441a5 call 7fe43358 614->627 628 7fe44170 614->628 615->593 616->615 634 7fe441a7-7fe441bd CreateThread CloseHandle 627->634 635 7fe441c3-7fe441ca 627->635 630 7fe44192-7fe44194 628->630 631 7fe44172-7fe4418c wsprintfA 628->631 630->627 631->630 633 7fe4418e 631->633 633->630 634->635 636 7fe441d0-7fe441eb 635->636 638 7fe44210-7fe44214 636->638 639 7fe441ed-7fe441f4 636->639 638->613 641 7fe4421a-7fe4421c 638->641 639->638 640 7fe441f6-7fe44207 GetTickCount 639->640 640->638 642 7fe44209 640->642 643 7fe4421e-7fe44236 641->643 642->638 644 7fe44238 643->644 645 7fe4423b-7fe44243 643->645 644->645 645->643 646 7fe44245 645->646 647 7fe4424b-7fe4424f 646->647 648 7fe44261-7fe44263 647->648 649 7fe44251-7fe44258 call 7fe42f08 647->649 651 7fe44265-7fe4426f 648->651 649->613 654 7fe4425a 649->654 653 7fe44274-7fe44282 call 7fe46541 call 7fe4655b 651->653 653->636 660 7fe44288-7fe44292 Sleep 653->660 654->651 656 7fe4425c-7fe4425f 654->656 656->647 660->653 661 7fe44294-7fe442a5 GetTickCount 660->661 661->636 662 7fe442ab-7fe442b2 661->662 662->613 662->636
                                                                                                                      APIs
                                                                                                                      • GetWindowsDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 7FE43CA1
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 7FE43CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 1749273276-1098094878
                                                                                                                      • Opcode ID: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                                                                                                      • Instruction ID: a9c893c36cba37f36994ff1ade31cd64da17a3bb77e2321a458bf3f53f95c566
                                                                                                                      • Opcode Fuzzy Hash: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                                                                                                      • Instruction Fuzzy Hash: 9102E071509358BFEB229F209C0ABEA7BACEF41304F00551DFC4A9E081D6F46F459BA6

                                                                                                                      Control-flow Graph

                                                                                                                      • Executed
                                                                                                                      • Not Executed
                                                                                                                      control_flow_graph 663 aa3cc2-aa3cca GetModuleHandleA 664 aa3ccc-aa3cdc call aa26d4 GetProcAddress 663->664 665 aa3ce0-aa3dc0 call aa3cf0 GetProcAddress LoadLibraryA call aa10ce call aa01cb GetTickCount call aa3b76 663->665 664->665 671 aa3cde 664->671 678 aa3dc8-aa3dcd call aa3b76 665->678 679 aa3dc2 665->679 671->665 682 aa3dcf-aa3de6 678->682 679->678 683 aa3de8-aa3df8 call aa63a0 call aa273c 682->683 688 aa3dfa-aa3dfc 683->688 689 aa3dfe-aa3e1a call aa63a0 683->689 691 aa3e1b-aa3e1c 688->691 689->691 691->683 692 aa3e1e-aa3e24 691->692 692->682 694 aa3e26-aa3e30 call aa273c 692->694 697 aa3e3f-aa3e78 call aa273c GetVolumeInformationA 694->697 698 aa3e32-aa3e3a call aa2750 694->698 702 aa3e7a-aa3e80 697->702 703 aa3e82-aa3e88 697->703 698->697 705 aa3e91-aa3e9e 702->705 704 aa3e8a 703->704 703->705 704->705 706 aa3ea4-aa3ec3 call aa3eb5 705->706 707 aa3f25 705->707 714 aa3f1c-aa3f1e 706->714 715 aa3ec6-aa3ec8 706->715 709 aa3f2f 707->709 710 aa3f4f-aa3fd1 call aa3f60 call aa10ce call aa3f8f 709->710 711 aa3f31-aa3f49 CreateThread CloseHandle 709->711 726 aa3ffa-aa400b CreateEventA 710->726 727 aa3fd3-aa3ff8 CreateThread CloseHandle 710->727 711->710 714->707 718 aa3f20 call aa3405 714->718 715->709 717 aa3eca-aa3f14 GetModuleFileNameA wsprintfA 715->717 717->714 718->707 728 aa4012-aa402a call aa37fa 726->728 727->726 731 aa402c-aa402f 728->731 732 aa4031-aa4044 call aa3b90 728->732 731->732 734 aa404c-aa4054 731->734 738 aa404a 732->738 739 aa42be-aa42c5 732->739 736 aa4056-aa4063 lstrlen 734->736 737 aa4065-aa406e gethostbyname 734->737 736->736 736->737 740 aa4074-aa407b 737->740 741 aa4315-aa431b 737->741 742 aa4081-aa40a0 socket 738->742 743 aa4320-aa4322 RtlExitUserThread 739->743 744 aa42c7-aa42ce 739->744 740->742 741->728 742->739 745 aa40a6-aa40b9 connect 742->745 746 aa42e2-aa42e9 744->746 747 aa42d0-aa42dc SetEvent 744->747 750 aa40bf-aa416e call aa273c call aa2750 GetVersionExA call aa2750 call aa3358 call aa4178 745->750 751 aa42b7-aa42b8 closesocket 745->751 748 aa42eb 746->748 749 aa42f2-aa4310 Sleep ResetEvent 746->749 747->746 748->749 749->728 762 aa4170 750->762 763 aa4195-aa41a5 call aa3358 750->763 751->739 764 aa4192-aa4194 762->764 765 aa4172-aa418c wsprintfA 762->765 769 aa41c3-aa41ca 763->769 770 aa41a7-aa41bd CreateThread CloseHandle 763->770 764->763 765->764 767 aa418e 765->767 767->764 771 aa41d0-aa41eb 769->771 770->769 773 aa41ed-aa41f4 771->773 774 aa4210-aa4214 771->774 773->774 776 aa41f6-aa4207 GetTickCount 773->776 774->751 775 aa421a-aa421c 774->775 777 aa421e-aa4236 775->777 776->774 778 aa4209 776->778 779 aa423b-aa4243 777->779 780 aa4238 777->780 778->774 779->777 781 aa4245 779->781 780->779 782 aa424b-aa424f 781->782 783 aa4261-aa4263 782->783 784 aa4251-aa4258 call aa2f08 782->784 786 aa4265-aa426f 783->786 784->751 789 aa425a 784->789 788 aa4274-aa4282 call aa6541 call aa655b 786->788 788->771 795 aa4288-aa4292 Sleep 788->795 789->786 791 aa425c-aa425f 789->791 791->782 795->788 796 aa4294-aa42a5 GetTickCount 795->796 796->771 797 aa42ab-aa42b2 796->797 797->751 797->771
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00AA3CBA), ref: 00AA3CC2
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 00AA3CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AA3D41), ref: 00AA3D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AA3D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AA3D93
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2837544101-1098094878
                                                                                                                      • Opcode ID: 9b70a38c1194afa68475894e3a227ac40eb20d30a27607f9878cba57f3019f6e
                                                                                                                      • Instruction ID: 781ab1709a196a277684e130d25bfb671fcadc037e7e1dc010c2f33fa9bd0964
                                                                                                                      • Opcode Fuzzy Hash: 9b70a38c1194afa68475894e3a227ac40eb20d30a27607f9878cba57f3019f6e
                                                                                                                      • Instruction Fuzzy Hash: E9E1DE72518258BFEB25AF248C4ABEA7BACEF42300F044559F8499F0C2D7F45F4987A5
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE43CBA), ref: 7FE43CC2
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000002), ref: 7FE43CD4
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2837544101-1098094878
                                                                                                                      • Opcode ID: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                                                                                                      • Instruction ID: c453ebe4c61d0623fc47b3a56a20a6bb1634521f5f2c168e6baeb2cb6925c9c1
                                                                                                                      • Opcode Fuzzy Hash: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                                                                                                      • Instruction Fuzzy Hash: CEE1F171509358BFEB229F209C4ABEA7BACEF41304F00555DFC4A8E081D6F46F059BA6
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00AA3CE5), ref: 00AA3CF0
                                                                                                                      • GetSystemDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 00AA3D07
                                                                                                                        • Part of subcall function 00AA3D1F: lstrcat.KERNEL32(020a00 . . :#73204497e +*,00AA3D12), ref: 00AA3D20
                                                                                                                        • Part of subcall function 00AA3D1F: GetProcAddress.KERNEL32(00000000,00AA3D41), ref: 00AA3D4C
                                                                                                                        • Part of subcall function 00AA3D1F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AA3D5F
                                                                                                                        • Part of subcall function 00AA3D1F: GetTickCount.KERNEL32 ref: 00AA3D93
                                                                                                                        • Part of subcall function 00AA3D1F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AA6EF6,00000000,00000000,00000000,00000000), ref: 00AA3E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 215653160-1098094878
                                                                                                                      • Opcode ID: 158a8434471a8ffb3d7ae248ffa9ddca1129267620db11f9b1b166f622603453
                                                                                                                      • Instruction ID: ca90617d8153af452634bda31f07ae7e613f074072da4819399634f7ba9e6aad
                                                                                                                      • Opcode Fuzzy Hash: 158a8434471a8ffb3d7ae248ffa9ddca1129267620db11f9b1b166f622603453
                                                                                                                      • Instruction Fuzzy Hash: CBE1DE72418248BFEB259F248C4ABEA7BACEF42300F044559F9499F0C2D7F45F498BA5
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE43CE5), ref: 7FE43CF0
                                                                                                                      • GetSystemDirectoryA.KERNEL32(020a00 . . :#73204497e +*,00000104), ref: 7FE43D07
                                                                                                                        • Part of subcall function 7FE43D1F: lstrcat.KERNEL32(020a00 . . :#73204497e +*,7FE43D12), ref: 7FE43D20
                                                                                                                        • Part of subcall function 7FE43D1F: GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                        • Part of subcall function 7FE43D1F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                        • Part of subcall function 7FE43D1F: GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                        • Part of subcall function 7FE43D1F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 215653160-1098094878
                                                                                                                      • Opcode ID: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                                                                                                      • Instruction ID: a575d1816f1fafdbe36b7d8d9a618c6fc80930f7c3831f5bc8b2ed9575ddbc2a
                                                                                                                      • Opcode Fuzzy Hash: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                                                                                                      • Instruction Fuzzy Hash: 23E1DF71509358BFEB229F209C0ABEA7BACEF42304F00655DFC4A9E081D6F46F459B65
                                                                                                                      APIs
                                                                                                                      • lstrcat.KERNEL32(020a00 . . :#73204497e +*,00AA3D12), ref: 00AA3D20
                                                                                                                        • Part of subcall function 00AA3D36: LoadLibraryA.KERNEL32(00AA3D2B), ref: 00AA3D36
                                                                                                                        • Part of subcall function 00AA3D36: GetProcAddress.KERNEL32(00000000,00AA3D41), ref: 00AA3D4C
                                                                                                                        • Part of subcall function 00AA3D36: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AA3D5F
                                                                                                                        • Part of subcall function 00AA3D36: GetTickCount.KERNEL32 ref: 00AA3D93
                                                                                                                        • Part of subcall function 00AA3D36: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AA6EF6,00000000,00000000,00000000,00000000), ref: 00AA3E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2038497427-1098094878
                                                                                                                      • Opcode ID: 76485783ef1ebb789075038bc73b431c85142a4efb66d1d2d75da6d752c3c390
                                                                                                                      • Instruction ID: e5463bfdef9abc0e1f22a856e8494b4a79e5c6d099ad5187e880a55d0dd8b02c
                                                                                                                      • Opcode Fuzzy Hash: 76485783ef1ebb789075038bc73b431c85142a4efb66d1d2d75da6d752c3c390
                                                                                                                      • Instruction Fuzzy Hash: C3E1CD72518258BFEB25AF248C4ABEA7BACEF42300F044559F8499F0C2D7F45F498765
                                                                                                                      APIs
                                                                                                                      • lstrcat.KERNEL32(020a00 . . :#73204497e +*,7FE43D12), ref: 7FE43D20
                                                                                                                        • Part of subcall function 7FE43D36: LoadLibraryA.KERNEL32(7FE43D2B), ref: 7FE43D36
                                                                                                                        • Part of subcall function 7FE43D36: GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                        • Part of subcall function 7FE43D36: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                        • Part of subcall function 7FE43D36: GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                        • Part of subcall function 7FE43D36: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2038497427-1098094878
                                                                                                                      • Opcode ID: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                                                                                                      • Instruction ID: 426a991c9d28a372a142f780a5599c1fe21c99d29c9374d1d361bc923b179bdc
                                                                                                                      • Opcode Fuzzy Hash: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                                                                                                      • Instruction Fuzzy Hash: 71E1ED71509358BFEB229F209C0ABEA7BACEF42304F00655DFC4A9E081D6F46F459B65
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AA3D2B), ref: 00AA3D36
                                                                                                                        • Part of subcall function 00AA3D4B: GetProcAddress.KERNEL32(00000000,00AA3D41), ref: 00AA3D4C
                                                                                                                        • Part of subcall function 00AA3D4B: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AA3D5F
                                                                                                                        • Part of subcall function 00AA3D4B: GetTickCount.KERNEL32 ref: 00AA3D93
                                                                                                                        • Part of subcall function 00AA3D4B: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AA6EF6,00000000,00000000,00000000,00000000), ref: 00AA3E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 3734769084-1098094878
                                                                                                                      • Opcode ID: 6f01ac3ceebeb8875c516713d47fef36de49695922c4d05a487e9876f0f81099
                                                                                                                      • Instruction ID: f54c0c34b96778167f479bd081aafba37f43a9c6fcaccb7a235f4b1dbeb493a5
                                                                                                                      • Opcode Fuzzy Hash: 6f01ac3ceebeb8875c516713d47fef36de49695922c4d05a487e9876f0f81099
                                                                                                                      • Instruction Fuzzy Hash: 4DD1CC72518248BEEF25AF648C0ABEA7BACEF42300F004559F8499F0C2D7F45F498B65
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43D2B), ref: 7FE43D36
                                                                                                                        • Part of subcall function 7FE43D4B: GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                        • Part of subcall function 7FE43D4B: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                        • Part of subcall function 7FE43D4B: GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                        • Part of subcall function 7FE43D4B: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 3734769084-1098094878
                                                                                                                      • Opcode ID: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                                                                                                      • Instruction ID: b6e5c684999b5124a360ce0b6569c1417190782f1e811f7b4d9ad18746e01973
                                                                                                                      • Opcode Fuzzy Hash: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                                                                                                      • Instruction Fuzzy Hash: 57D1DC71509358BFEB229F609C0ABEA7BACEF41304F00261DFC4A9E081D6F46F459B65
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AA3D41), ref: 00AA3D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00AA3D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AA3D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00AA6EF6,00000000,00000000,00000000,00000000), ref: 00AA3E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AA3EE2
                                                                                                                      • wsprintfA.USER32 ref: 00AA3EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,00AA3691,00000000,00000000), ref: 00AA3F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 00AA3F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AA3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AA3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AA3FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AA4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AA3B09,00000010), ref: 00AA40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AA40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AA4179
                                                                                                                      • SetEvent.KERNEL32(00000420,?,00000000), ref: 00AA42D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 00AA42F7
                                                                                                                      • ResetEvent.KERNEL32(00000420,?,00000000), ref: 00AA430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateEvent$CloseHandleThreadwsprintf$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolumeconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 1567941233-1098094878
                                                                                                                      • Opcode ID: 37f71bab4d2de818bdccc00d64875a05fb76d33de7a3105dbbaf66ef052a4c57
                                                                                                                      • Instruction ID: 52081efc7000bdc2eae1fbbb5058f8ed54859e2d53be8657d897b7b273a42170
                                                                                                                      • Opcode Fuzzy Hash: 37f71bab4d2de818bdccc00d64875a05fb76d33de7a3105dbbaf66ef052a4c57
                                                                                                                      • Instruction Fuzzy Hash: EBE1CD72418248BEEF25AF248C0ABEA7BACEF46300F004659F9499F0C2D7F45F458765
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43D41), ref: 7FE43D4C
                                                                                                                      • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE43D5F
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE43D93
                                                                                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE46EF6,00000000,00000000,00000000,00000000), ref: 7FE43E65
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                      • wsprintfA.USER32 ref: 7FE43EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,7FE43691,00000000,00000000), ref: 7FE43F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 7FE43F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • SetEvent.KERNEL32(00000420,?,00000000), ref: 7FE442D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 7FE442F7
                                                                                                                      • ResetEvent.KERNEL32(00000420,?,00000000), ref: 7FE4430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateEvent$CloseHandleThreadwsprintf$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolumeconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 1567941233-1098094878
                                                                                                                      • Opcode ID: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                                                                                                      • Instruction ID: 0e4750c5ff84578107d1dc44a4ef0d59ba4f1e35034c124ccd42fec35a7c9163
                                                                                                                      • Opcode Fuzzy Hash: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                                                                                                      • Instruction Fuzzy Hash: 14E1DD71509358BEEB219F20AC0ABEA7BACEF41304F00265DFC4A9E081D6F46F45DB65
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 7FE404BE
                                                                                                                      • GetVersion.KERNEL32 ref: 7FE40500
                                                                                                                      • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 7FE40528
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE405AD
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$AllocCloseModuleVersionVirtual
                                                                                                                      • String ID: \BaseNamedObjects\tputVt$\BaseNamedObjects\tputVt$csrs
                                                                                                                      • API String ID: 3017432202-3247437241
                                                                                                                      • Opcode ID: f890454a24b3513c1b55c4f80a054a355f1c355fc5fef7395a7dd97704e0407a
                                                                                                                      • Instruction ID: 9efcd029e5ff9f702e5d24ec4e940baa3aca8c5eca23fca7c65c58fce1734464
                                                                                                                      • Opcode Fuzzy Hash: f890454a24b3513c1b55c4f80a054a355f1c355fc5fef7395a7dd97704e0407a
                                                                                                                      • Instruction Fuzzy Hash: 26B1AB71506349FFEB229F64E809BEA3BA9EF45714F00112CFA0A9E580C7F49B458B59
                                                                                                                      APIs
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE405AD
                                                                                                                      • GetModuleHandleA.KERNEL32(7FE405EC), ref: 7FE405F2
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tputVt,\BaseNamedObjects\tputVt,?,?,?,?), ref: 7FE4070A
                                                                                                                      • lstrcpyW.KERNEL32(\BaseNamedObjects\tputVt,?), ref: 7FE4072D
                                                                                                                      • lstrcatW.KERNEL32(\BaseNamedObjects\tputVt,\tputVt), ref: 7FE4073B
                                                                                                                      • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 7FE4076B
                                                                                                                      • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 7FE40786
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407C9
                                                                                                                      • Process32First.KERNEL32 ref: 7FE407DC
                                                                                                                      • Process32Next.KERNEL32 ref: 7FE407ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE40805
                                                                                                                      • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 7FE40842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE4085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 7FE4086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                                                                                                      • String ID: \BaseNamedObjects\tputVt$\BaseNamedObjects\tputVt$csrs
                                                                                                                      • API String ID: 1545766225-3247437241
                                                                                                                      • Opcode ID: e7aba79f75a4323e5cb79a812cd71f4cf66a4d1f1c27252f97298980dbdbaa5f
                                                                                                                      • Instruction ID: 92e33fe563f4ce631dd87b3f5722c0db0ec9cf3d935b64cf14b3b9bf1e8ed77e
                                                                                                                      • Opcode Fuzzy Hash: e7aba79f75a4323e5cb79a812cd71f4cf66a4d1f1c27252f97298980dbdbaa5f
                                                                                                                      • Instruction Fuzzy Hash: 0F718B31505205FFEB219E50EC49BBE3BBAEF49715F10102CFA0A9E490C7B59B059B99
                                                                                                                      APIs
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00AA4057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00AA4066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AA4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AA3B09,00000010), ref: 00AA40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AA40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AA4179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 00AA41B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,00AA6AA2,00000000,00000000), ref: 00AA41BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AA41F6
                                                                                                                      • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,00AA6AA2,00000000,00000000), ref: 00AA428B
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AA4294
                                                                                                                      • closesocket.WS2_32(6F6C6902), ref: 00AA42B8
                                                                                                                      • SetEvent.KERNEL32(00000420,?,00000000), ref: 00AA42D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 00AA42F7
                                                                                                                      • ResetEvent.KERNEL32(00000420,?,00000000), ref: 00AA430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 883794535-1334317923
                                                                                                                      • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction ID: 8be2a255f2ea7fca36e0c679d52afc48241636394c09832464ae79caeff96162
                                                                                                                      • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction Fuzzy Hash: 1E71BB71508258BAEF219F28881D7EEBBADAF8A310F140608F85A9F1C1C7F45F45D765
                                                                                                                      APIs
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE44057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE44066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE441B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE441BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE441F6
                                                                                                                      • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE4428B
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE44294
                                                                                                                      • closesocket.WS2_32(6F6C6902), ref: 7FE442B8
                                                                                                                      • SetEvent.KERNEL32(00000420,?,00000000), ref: 7FE442D6
                                                                                                                      • Sleep.KERNEL32(00007530,?,00000000), ref: 7FE442F7
                                                                                                                      • ResetEvent.KERNEL32(00000420,?,00000000), ref: 7FE4430A
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 883794535-1334317923
                                                                                                                      • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction ID: c034f442e2d8f513e2b327ea41ce5463e34186132653b9dadba1924edba9b606
                                                                                                                      • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                                                                                                      • Instruction Fuzzy Hash: AF71CF75608398BAEB219F3498187EEBFADEF81314F00260CEC5A9E181C7F46B41D755
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 00AA344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00AA3469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00AA3493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00AA34A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 00AA34B8
                                                                                                                      Strings
                                                                                                                      • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 00AA3414
                                                                                                                      • \Device\PhysicalMemory, xrefs: 00AA33E0
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                                                                                                      • API String ID: 2985292042-3938670448
                                                                                                                      • Opcode ID: 2088b6c76b8a6be68382f79cae9732484fb1a1ee9dfb7a6f97ccbe8c37637849
                                                                                                                      • Instruction ID: c204f4264080c3a2377689963a17c0de2230fa6fd9ef3b92f391d4da379442de
                                                                                                                      • Opcode Fuzzy Hash: 2088b6c76b8a6be68382f79cae9732484fb1a1ee9dfb7a6f97ccbe8c37637849
                                                                                                                      • Instruction Fuzzy Hash: 78818971500208FFEB248F15CC89AAA7BBCEF49705F504618FD199B291D3F0AF458B68
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE4344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE43469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE43493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE434A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 7FE434B8
                                                                                                                      Strings
                                                                                                                      • \Device\PhysicalMemory, xrefs: 7FE433E0
                                                                                                                      • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 7FE43414
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                                                                                                      • API String ID: 2985292042-3938670448
                                                                                                                      • Opcode ID: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                                                                                                      • Instruction ID: 7fc34539aa9aeb006e3fd3aa9e627af0260f8b81ce38453cec28ed3fa0a6c215
                                                                                                                      • Opcode Fuzzy Hash: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                                                                                                      • Instruction Fuzzy Hash: 40817671600208BFEB218F14DC89ABA3BADEF44704F504658FD1A9B295D3B4AF459BA4
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 00AA344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00AA3469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00AA3493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00AA34A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 00AA34B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                                                                                                      • API String ID: 2985292042-2835701104
                                                                                                                      • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction ID: 3a1afca7d86bc8a8c5abff91119868195bcd2837266d417308d89fa1a4a13e06
                                                                                                                      • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction Fuzzy Hash: 66116D71140608BBEB24CF14CC59FAA767CEF88704F50451CFA199B2D0E7F46F148A68
                                                                                                                      APIs
                                                                                                                      • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE4344A
                                                                                                                      • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE43469
                                                                                                                      • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE43493
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE434A0
                                                                                                                      • UnmapViewOfFile.KERNEL32(?), ref: 7FE434B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                                                                                                      • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                                                                                                      • API String ID: 2985292042-2835701104
                                                                                                                      • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction ID: f43c089fce9089dd7d505f4faf75d8f33636ceb6be771680bc0a2bec27c6fb95
                                                                                                                      • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                                                                                                      • Instruction Fuzzy Hash: D5118B74640609BFEB24CF10DC55FEA367CEF88744F10451CFA1A9A290E7F46F189A28
                                                                                                                      APIs
                                                                                                                      • lstrcpyW.KERNEL32(?,\BaseNamedObjects\tputVt), ref: 00AA24BA
                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00AA24C1
                                                                                                                      • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 00AA2516
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tputVt, xrefs: 00AA24B8
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateSectionlstrcpylstrlen
                                                                                                                      • String ID: \BaseNamedObjects\tputVt
                                                                                                                      • API String ID: 2597515329-2261315748
                                                                                                                      • Opcode ID: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction ID: 92c1ffa831d56b6296a11355c9b9f41d6c602547f9c68c1e08e98fda6007e819
                                                                                                                      • Opcode Fuzzy Hash: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction Fuzzy Hash: 980181B0785344BAF7309B29CC4BF5B7929DF85B50F548558F608AE1C4DAB89A0483A9
                                                                                                                      APIs
                                                                                                                      • lstrcpyW.KERNEL32(?,\BaseNamedObjects\tputVt), ref: 7FE424BA
                                                                                                                      • lstrlenW.KERNEL32(?), ref: 7FE424C1
                                                                                                                      • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 7FE42516
                                                                                                                      Strings
                                                                                                                      • \BaseNamedObjects\tputVt, xrefs: 7FE424B8
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateSectionlstrcpylstrlen
                                                                                                                      • String ID: \BaseNamedObjects\tputVt
                                                                                                                      • API String ID: 2597515329-2261315748
                                                                                                                      • Opcode ID: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction ID: b59113b06402ddd1e6da3b59c174d95be42712fc9add0a4248e34075b754a1f5
                                                                                                                      • Opcode Fuzzy Hash: 4ad2ef6d84451204b22f2b8ef4fe8d4bb0979e9a2057be4b14859be0269e809c
                                                                                                                      • Instruction Fuzzy Hash: A70181B0785344BAF7309B29CC4BF5B7929DF81B50F508558F708AE1C4DAB89A0483A9
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AA3F83), ref: 00AA3F8F
                                                                                                                      • WSAStartup.WS2_32(00000101), ref: 00AA3FCE
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AA3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AA3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AA3FFF
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00AA4057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00AA4066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AA4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AA3B09,00000010), ref: 00AA40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AA40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AA4179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 00AA41B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,00AA6AA2,00000000,00000000), ref: 00AA41BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AA41F6
                                                                                                                      • RtlExitUserThread.NTDLL(00000000), ref: 00AA4322
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadStartupTickUserVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT$ilo.brenz.pl
                                                                                                                      • API String ID: 3316401344-1495104694
                                                                                                                      • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction ID: a6abbf6f5737d5b1a56f008b70c99df5fc1d73a109d756f3fc74ddd7c870bbb7
                                                                                                                      • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction Fuzzy Hash: 19918A71508248BAEB319F28881DBEA7BADEF8A301F040648F95A9F1C1D3F45F45DB65
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43F83), ref: 7FE43F8F
                                                                                                                      • WSAStartup.WS2_32(00000101), ref: 7FE43FCE
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE44057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE44066
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE441B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE441BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE441F6
                                                                                                                      • RtlExitUserThread.NTDLL(00000000), ref: 7FE44322
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadStartupTickUserVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT$ilo.brenz.pl
                                                                                                                      • API String ID: 3316401344-1495104694
                                                                                                                      • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction ID: 258e21987668317533843a9e7f1ff18d854900d0519197baaf77827f0a23c433
                                                                                                                      • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                                                                                                      • Instruction Fuzzy Hash: 1391AC75608348BAEB219F349819BEA7BADEF41304F00264CFC5A9E181C3F46F45DB65
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AA3EA9), ref: 00AA3EB5
                                                                                                                        • Part of subcall function 00AA3ECC: GetProcAddress.KERNEL32(00000000,00AA3EC0), ref: 00AA3ECD
                                                                                                                        • Part of subcall function 00AA3ECC: GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AA3EE2
                                                                                                                        • Part of subcall function 00AA3ECC: wsprintfA.USER32 ref: 00AA3EF7
                                                                                                                        • Part of subcall function 00AA3ECC: CreateThread.KERNEL32(00000000,00000000,00AA3691,00000000,00000000), ref: 00AA3F40
                                                                                                                        • Part of subcall function 00AA3ECC: CloseHandle.KERNEL32(?,780B832E), ref: 00AA3F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AA3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AA3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AA3FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AA4097
                                                                                                                      • connect.WS2_32(6F6C6902,00AA3B09,00000010), ref: 00AA40B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 00AA40FB
                                                                                                                      • wsprintfA.USER32 ref: 00AA4179
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleThreadwsprintf$AddressEventFileLibraryLoadModuleNameProcVersionconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 4150863296-2633921094
                                                                                                                      • Opcode ID: 09b915f81939338777e2238991f3bc6e2e241302df667124e3c5a6440f8bf480
                                                                                                                      • Instruction ID: 9554290cedf8e6fab48a230e72c5ce263c6f689cf07c7f49c1b51f187949117e
                                                                                                                      • Opcode Fuzzy Hash: 09b915f81939338777e2238991f3bc6e2e241302df667124e3c5a6440f8bf480
                                                                                                                      • Instruction Fuzzy Hash: 3BA1BE71518248BEEB219F648C5ABEA7BACEF86300F044649F8499F0C2D7F45F498765
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43EA9), ref: 7FE43EB5
                                                                                                                        • Part of subcall function 7FE43ECC: GetProcAddress.KERNEL32(00000000,7FE43EC0), ref: 7FE43ECD
                                                                                                                        • Part of subcall function 7FE43ECC: GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                        • Part of subcall function 7FE43ECC: wsprintfA.USER32 ref: 7FE43EF7
                                                                                                                        • Part of subcall function 7FE43ECC: CreateThread.KERNEL32(00000000,00000000,7FE43691,00000000,00000000), ref: 7FE43F40
                                                                                                                        • Part of subcall function 7FE43ECC: CloseHandle.KERNEL32(?,780B832E), ref: 7FE43F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                      • connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                      • GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleThreadwsprintf$AddressEventFileLibraryLoadModuleNameProcVersionconnectsocket
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 4150863296-2633921094
                                                                                                                      • Opcode ID: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                                                                                                      • Instruction ID: 0e8994d83ddfd1691c77ce3bf3b5f199d94e5f32b824b4e6e19193fb5f8cc64f
                                                                                                                      • Opcode Fuzzy Hash: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                                                                                                      • Instruction Fuzzy Hash: D1A1FE71509348BFEB219F249C49BEA7BACEF81304F00565DF84A8E181D6F46F05DBA6
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AA3EC0), ref: 00AA3ECD
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 00AA3EE2
                                                                                                                      • wsprintfA.USER32 ref: 00AA3EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,00AA3691,00000000,00000000), ref: 00AA3F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 00AA3F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AA3FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 00AA3FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AA3FFF
                                                                                                                        • Part of subcall function 00AA3405: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 00AA344A
                                                                                                                        • Part of subcall function 00AA3405: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00AA3469
                                                                                                                        • Part of subcall function 00AA3405: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00AA3493
                                                                                                                        • Part of subcall function 00AA3405: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00AA34A0
                                                                                                                        • Part of subcall function 00AA3405: UnmapViewOfFile.KERNEL32(?), ref: 00AA34B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmapwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 541178049-2633921094
                                                                                                                      • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction ID: d49dcd03f6b08019b4636ea30d3eaa8aec2625ee2db97a61eff1c86791902ec8
                                                                                                                      • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction Fuzzy Hash: D3A1DE71408248BEEB219F248C4ABEA7BACEF86300F044649F8498F0C2D3F45F4987A5
                                                                                                                      APIs
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE43EC0), ref: 7FE43ECD
                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#73204497e +*,000000C8), ref: 7FE43EE2
                                                                                                                      • wsprintfA.USER32 ref: 7FE43EF7
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,7FE43691,00000000,00000000), ref: 7FE43F40
                                                                                                                      • CloseHandle.KERNEL32(?,780B832E), ref: 7FE43F49
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                      • CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                        • Part of subcall function 7FE43405: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE4344A
                                                                                                                        • Part of subcall function 7FE43405: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE43469
                                                                                                                        • Part of subcall function 7FE43405: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE43493
                                                                                                                        • Part of subcall function 7FE43405: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE434A0
                                                                                                                        • Part of subcall function 7FE43405: UnmapViewOfFile.KERNEL32(?), ref: 7FE434B8
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmapwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$D s$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 541178049-2633921094
                                                                                                                      • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction ID: 0676d137f508c61ec9ecc8346a0bbca927df192c87e92b4f0c786ccd2b6385cd
                                                                                                                      • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                                                                                                      • Instruction Fuzzy Hash: E7A1ED71508358BFEB219F249C49BEA7BACEF81304F00565DF84A9E081D6F46F45CBA6
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(00AA3F54), ref: 00AA3F60
                                                                                                                        • Part of subcall function 00AA3F8F: LoadLibraryA.KERNEL32(00AA3F83), ref: 00AA3F8F
                                                                                                                        • Part of subcall function 00AA3F8F: WSAStartup.WS2_32(00000101), ref: 00AA3FCE
                                                                                                                        • Part of subcall function 00AA3F8F: CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00AA3FE9
                                                                                                                        • Part of subcall function 00AA3F8F: CloseHandle.KERNEL32(?,00000000), ref: 00AA3FF2
                                                                                                                        • Part of subcall function 00AA3F8F: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00AA3FFF
                                                                                                                        • Part of subcall function 00AA3F8F: socket.WS2_32(00000002,00000001,00000000), ref: 00AA4097
                                                                                                                        • Part of subcall function 00AA3F8F: connect.WS2_32(6F6C6902,00AA3B09,00000010), ref: 00AA40B1
                                                                                                                        • Part of subcall function 00AA3F8F: GetVersionExA.KERNEL32(?,?,00000000), ref: 00AA40FB
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00AA4057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00AA4066
                                                                                                                      • wsprintfA.USER32 ref: 00AA4179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 00AA41B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,00AA6AA2,00000000,00000000), ref: 00AA41BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 00AA41F6
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleLibraryLoadThread$CountEventStartupTickVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2996464229-1334317923
                                                                                                                      • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction ID: 81148831d52d7080ef9a7be23353995497ffe4b7e2d9055ad614226a71d7a71d
                                                                                                                      • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction Fuzzy Hash: FA81DF71518258BEEB219F248C59BEA7BACEF86300F044659F8499F1C2C3F45F49C761
                                                                                                                      APIs
                                                                                                                      • LoadLibraryA.KERNEL32(7FE43F54), ref: 7FE43F60
                                                                                                                        • Part of subcall function 7FE43F8F: LoadLibraryA.KERNEL32(7FE43F83), ref: 7FE43F8F
                                                                                                                        • Part of subcall function 7FE43F8F: WSAStartup.WS2_32(00000101), ref: 7FE43FCE
                                                                                                                        • Part of subcall function 7FE43F8F: CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 7FE43FE9
                                                                                                                        • Part of subcall function 7FE43F8F: CloseHandle.KERNEL32(?,00000000), ref: 7FE43FF2
                                                                                                                        • Part of subcall function 7FE43F8F: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 7FE43FFF
                                                                                                                        • Part of subcall function 7FE43F8F: socket.WS2_32(00000002,00000001,00000000), ref: 7FE44097
                                                                                                                        • Part of subcall function 7FE43F8F: connect.WS2_32(6F6C6902,7FE43B09,00000010), ref: 7FE440B1
                                                                                                                        • Part of subcall function 7FE43F8F: GetVersionExA.KERNEL32(?,?,00000000), ref: 7FE440FB
                                                                                                                      • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 7FE44057
                                                                                                                      • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE44066
                                                                                                                      • wsprintfA.USER32 ref: 7FE44179
                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 7FE441B4
                                                                                                                      • CloseHandle.KERNEL32(?,00000000,6F6C6902,7FE46AA2,00000000,00000000), ref: 7FE441BD
                                                                                                                      • GetTickCount.KERNEL32 ref: 7FE441F6
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Create$CloseHandleLibraryLoadThread$CountEventStartupTickVersionconnectgethostbynamelstrlensocketwsprintf
                                                                                                                      • String ID: 020a00 . . :#73204497e +*$D s$\DEVICE\AFD\ENDPOINT
                                                                                                                      • API String ID: 2996464229-1334317923
                                                                                                                      • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction ID: 4e50c4f88f24425f4bee18bfb6ce842719449d350e033f98fb2c42de0991043e
                                                                                                                      • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                                                                                                      • Instruction Fuzzy Hash: 0781EE71608398BEEB228F349C19BEA7BADEF41314F04165DE84A8E1C1C2F46B45C766
                                                                                                                      APIs
                                                                                                                      • GetSystemTime.KERNEL32(00AA7584), ref: 00AA389F
                                                                                                                      • Sleep.KERNEL32(0000EA60), ref: 00AA3911
                                                                                                                      • InternetGetConnectedState.WININET(?,00000000), ref: 00AA392A
                                                                                                                      • gethostbyname.WS2_32(0D278125), ref: 00AA396C
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 00AA3981
                                                                                                                      • ioctlsocket.WS2_32(?,8004667E), ref: 00AA399A
                                                                                                                      • connect.WS2_32(?,?,00000010), ref: 00AA39B3
                                                                                                                      • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 00AA39C1
                                                                                                                      • closesocket.WS2_32 ref: 00AA3A20
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep$ConnectedInternetStateSystemTimeclosesocketconnectgethostbynameioctlsocketsocket
                                                                                                                      • String ID: ueqfel.com
                                                                                                                      • API String ID: 159131500-2992884172
                                                                                                                      • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction ID: 88936c64ea0c52c5b29a61f320eb0a9722aecc75d2507062f6e6ad7ce3e28b23
                                                                                                                      • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction Fuzzy Hash: F141B232644258BAEF319F248C4EB9A7B6EAF86710F044029F949DF1C1D7F59F408720
                                                                                                                      APIs
                                                                                                                      • GetSystemTime.KERNEL32(7FE47584), ref: 7FE4389F
                                                                                                                      • Sleep.KERNEL32(0000EA60), ref: 7FE43911
                                                                                                                      • InternetGetConnectedState.WININET(?,00000000), ref: 7FE4392A
                                                                                                                      • gethostbyname.WS2_32(0D278125), ref: 7FE4396C
                                                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 7FE43981
                                                                                                                      • ioctlsocket.WS2_32(?,8004667E), ref: 7FE4399A
                                                                                                                      • connect.WS2_32(?,?,00000010), ref: 7FE439B3
                                                                                                                      • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 7FE439C1
                                                                                                                      • closesocket.WS2_32 ref: 7FE43A20
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: Sleep$ConnectedInternetStateSystemTimeclosesocketconnectgethostbynameioctlsocketsocket
                                                                                                                      • String ID: ueqfel.com
                                                                                                                      • API String ID: 159131500-2992884172
                                                                                                                      • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction ID: eea604ef3eef491c3b4b486964eb23317b1c68c5be79fae7d3127a3215423796
                                                                                                                      • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                                                                                                      • Instruction Fuzzy Hash: 4241B131644348BEEB218E209C49BE9BB6EEF85754F04512DF94ADE1C1D7F5AB40A720
                                                                                                                      APIs
                                                                                                                        • Part of subcall function 7FE4144A: LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE4145A
                                                                                                                        • Part of subcall function 7FE4144A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE4146A
                                                                                                                      • CloseHandle.KERNEL32(?), ref: 7FE405AD
                                                                                                                      • FreeLibrary.KERNEL32(75670000,?,7FE4079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407B8
                                                                                                                      • CloseHandle.KERNEL32(?,?,7FE4079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407BF
                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE407C9
                                                                                                                      • Process32First.KERNEL32 ref: 7FE407DC
                                                                                                                      • Process32Next.KERNEL32 ref: 7FE407ED
                                                                                                                      • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE40805
                                                                                                                      • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 7FE40842
                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 7FE4085D
                                                                                                                      • CloseHandle.KERNEL32 ref: 7FE4086C
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                                                                                                      • String ID: csrs
                                                                                                                      • API String ID: 3908997113-2321902090
                                                                                                                      • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction ID: a6d35856a40c53af25f3dd880ced36f98488441f4133b4430f7fa635e460986d
                                                                                                                      • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                                                                                                      • Instruction Fuzzy Hash: AB113030501205BBEB255F21DD49BBF3A6DEF54711F00112CF94B99081C6B49B018AAA
                                                                                                                      APIs
                                                                                                                      • GetTempPathA.KERNEL32(00000104), ref: 00AA278C
                                                                                                                        • Part of subcall function 00AA27A7: GetTempFileNameA.KERNEL32(?,00AA27A3,00000000,?), ref: 00AA27A8
                                                                                                                        • Part of subcall function 00AA27A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,00AA27A3,00000000,?), ref: 00AA27C3
                                                                                                                        • Part of subcall function 00AA27A7: InternetReadFile.WININET(?,?,00000104), ref: 00AA27DD
                                                                                                                        • Part of subcall function 00AA27A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,00AA27A3,00000000,?), ref: 00AA27F3
                                                                                                                        • Part of subcall function 00AA27A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,00AA27A3,00000000,?), ref: 00AA27FF
                                                                                                                        • Part of subcall function 00AA27A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,00AA27A3), ref: 00AA2823
                                                                                                                        • Part of subcall function 00AA27A7: InternetCloseHandle.WININET(?), ref: 00AA2833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00AA283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$CreateTemp$NamePathProcessReadWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1995088466-0
                                                                                                                      • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction ID: d9822933de24f6d68b52bdae8fcbf8006a8d7a84b55493678d97a516dfc51314
                                                                                                                      • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction Fuzzy Hash: A621AEB1144206BFE7215B24CC8AFEB3A2DEF96B10F000119FA499A0C2D7B19B1586A6
                                                                                                                      APIs
                                                                                                                      • GetTempPathA.KERNEL32(00000104), ref: 7FE4278C
                                                                                                                        • Part of subcall function 7FE427A7: GetTempFileNameA.KERNEL32(?,7FE427A3,00000000,?), ref: 7FE427A8
                                                                                                                        • Part of subcall function 7FE427A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE427A3,00000000,?), ref: 7FE427C3
                                                                                                                        • Part of subcall function 7FE427A7: InternetReadFile.WININET(?,?,00000104), ref: 7FE427DD
                                                                                                                        • Part of subcall function 7FE427A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427F3
                                                                                                                        • Part of subcall function 7FE427A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427FF
                                                                                                                        • Part of subcall function 7FE427A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE427A3), ref: 7FE42823
                                                                                                                        • Part of subcall function 7FE427A7: InternetCloseHandle.WININET(?), ref: 7FE42833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 7FE4283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$CreateTemp$NamePathProcessReadWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 1995088466-0
                                                                                                                      • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction ID: d2f72ca38739e1223d228fa8915e7a2d59a899e2c4950480ab4928b4c105e288
                                                                                                                      • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                                                                                                      • Instruction Fuzzy Hash: C821D2B1145306BFE7215B20DC8EFFF3A2DEF95B10F000119FA4A99081D7B19A15C6BA
                                                                                                                      APIs
                                                                                                                      • GetTempFileNameA.KERNEL32(?,00AA27A3,00000000,?), ref: 00AA27A8
                                                                                                                      • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,00AA27A3,00000000,?), ref: 00AA27C3
                                                                                                                      • InternetReadFile.WININET(?,?,00000104), ref: 00AA27DD
                                                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,00AA27A3,00000000,?), ref: 00AA27F3
                                                                                                                      • CloseHandle.KERNEL32(?,00000104,?,00000000,?,00AA27A3,00000000,?), ref: 00AA27FF
                                                                                                                      • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,00AA27A3), ref: 00AA2823
                                                                                                                      • InternetCloseHandle.WININET(?), ref: 00AA2833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00AA283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$Create$NameProcessReadTempWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3452404049-0
                                                                                                                      • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction ID: 8c088c9ed766d716a58091647d95b3bb05fcbf578a6812b173d67d6a82d5a051
                                                                                                                      • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction Fuzzy Hash: 5A1161B1100606BBEB250B24CC49FFB7A2DEF95B10F004519FA0699080DBF55F5196A8
                                                                                                                      APIs
                                                                                                                      • GetTempFileNameA.KERNEL32(?,7FE427A3,00000000,?), ref: 7FE427A8
                                                                                                                      • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE427A3,00000000,?), ref: 7FE427C3
                                                                                                                      • InternetReadFile.WININET(?,?,00000104), ref: 7FE427DD
                                                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427F3
                                                                                                                      • CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE427A3,00000000,?), ref: 7FE427FF
                                                                                                                      • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE427A3), ref: 7FE42823
                                                                                                                      • InternetCloseHandle.WININET(?), ref: 7FE42833
                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 7FE4283A
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: File$CloseHandleInternet$Create$NameProcessReadTempWrite
                                                                                                                      • String ID:
                                                                                                                      • API String ID: 3452404049-0
                                                                                                                      • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction ID: 22dcc7b0365fcf1d6eb4fed4657db19a0a0b5e3cffdb9644fcda0f43dbdbc4f6
                                                                                                                      • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                                                                                                      • Instruction Fuzzy Hash: B8116DB1100606BBEB250F21DC4EFFF7A2DEF89B14F004519FA0699080DBF5AA5196A8
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(039EF878), ref: 00AA113D
                                                                                                                      • GetProcAddress.KERNEL32(00000000,00AA11D6), ref: 00AA1148
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2280337186.0000000000AA0000.00000040.10000000.00040000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_aa0000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressHandleModuleProc
                                                                                                                      • String ID: .DLL
                                                                                                                      • API String ID: 1646373207-899428287
                                                                                                                      • Opcode ID: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction ID: 2d8b4caed2cf6f00cb4aad0bd3fe46e62c5c2354828cb9ad076a0f063405c334
                                                                                                                      • Opcode Fuzzy Hash: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction Fuzzy Hash: A9019230607005FADFA59F6CC949AAA3B7DFF06355F10421CEA1A8B2D6C7708E808699
                                                                                                                      APIs
                                                                                                                      • GetModuleHandleA.KERNEL32(039EF878), ref: 7FE4113D
                                                                                                                      • GetProcAddress.KERNEL32(00000000,7FE411D6), ref: 7FE41148
                                                                                                                      Strings
                                                                                                                      Memory Dump Source
                                                                                                                      • Source File: 00000011.00000002.2303054677.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE40000, based on PE: false
                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                      • Snapshot File: hcaresult_17_2_7fe40000_mssecsvc.jbxd
                                                                                                                      Yara matches
                                                                                                                      Similarity
                                                                                                                      • API ID: AddressHandleModuleProc
                                                                                                                      • String ID: .DLL
                                                                                                                      • API String ID: 1646373207-899428287
                                                                                                                      • Opcode ID: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction ID: ea4a2056f9d9eec985f90d0e6f51664608bc9cd6dcfcab51fc2ae76c9b6c8238
                                                                                                                      • Opcode Fuzzy Hash: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                                                                                                      • Instruction Fuzzy Hash: D301E130607204EACF538F38E945BBE3B7DEB04265F20211DF90A8A759C7789A408B95