Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ImPgtzz6o4.dll

Overview

General Information

Sample name:ImPgtzz6o4.dll
renamed because original name is a hash value
Original sample name:269d6a38de8ff33cb033509ef49dd7d2.dll
Analysis ID:1592106
MD5:269d6a38de8ff33cb033509ef49dd7d2
SHA1:f5c2049a17b5c3b6d3ba93f06a61ad8ae264fb60
SHA256:62e9391e7aada2e5c0ee36f418c78da93bafc6db05fc05ca8a7dce824ced2e62
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6484 cmdline: loaddll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6460 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 576 cmdline: rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 4296 cmdline: C:\WINDOWS\mssecsvc.exe MD5: A7DEF9BF7875F39BF0AA1C76BBE3D4F6)
          • tasksche.exe (PID: 3092 cmdline: C:\WINDOWS\tasksche.exe /i MD5: FCBC058EEAB7FD8C9B6FE129EEFF2C88)
    • rundll32.exe (PID: 5696 cmdline: rundll32.exe C:\Users\user\Desktop\ImPgtzz6o4.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6592 cmdline: rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 6572 cmdline: C:\WINDOWS\mssecsvc.exe MD5: A7DEF9BF7875F39BF0AA1C76BBE3D4F6)
        • tasksche.exe (PID: 7232 cmdline: C:\WINDOWS\tasksche.exe /i MD5: FCBC058EEAB7FD8C9B6FE129EEFF2C88)
  • mssecsvc.exe (PID: 1472 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: A7DEF9BF7875F39BF0AA1C76BBE3D4F6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ImPgtzz6o4.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    ImPgtzz6o4.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    ImPgtzz6o4.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000005.00000000.2043608275.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        0000000B.00000000.2080438903.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000A.00000002.2081398569.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            7.2.mssecsvc.exe.1eb2084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            7.2.mssecsvc.exe.23ce8c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            7.2.mssecsvc.exe.23dd948.8.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              7.2.mssecsvc.exe.23dd948.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x32520:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0x222ec:$x3: tasksche.exe
              • 0x324fc:$x3: tasksche.exe
              • 0x324d8:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0x32550:$x5: WNcry@2ol7
              • 0x22357:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              • 0x82d0:$x7: mssecsvc.exe
              • 0x222c4:$x8: C:\%s\qeriuwjhrf
              • 0x32520:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0x82b8:$s1: C:\%s\%s
              • 0x222d8:$s1: C:\%s\%s
              • 0x32450:$s3: cmd.exe /c "%s"
              • 0x649a4:$s4: msg/m_portuguese.wnry
              • 0x1f60c:$s5: \\192.168.56.20\IPC$
              • 0xca01:$s6: \\172.16.99.5\IPC$
              • 0x25a26:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x25700:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x252ec:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              7.2.mssecsvc.exe.23dd948.8.raw.unpackWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
              • 0xca4c:$s1: __TREEID__PLACEHOLDER__
              • 0xcae8:$s1: __TREEID__PLACEHOLDER__
              • 0xd354:$s1: __TREEID__PLACEHOLDER__
              • 0xe3b9:$s1: __TREEID__PLACEHOLDER__
              • 0xf420:$s1: __TREEID__PLACEHOLDER__
              • 0x10488:$s1: __TREEID__PLACEHOLDER__
              • 0x114f0:$s1: __TREEID__PLACEHOLDER__
              • 0x12558:$s1: __TREEID__PLACEHOLDER__
              • 0x135c0:$s1: __TREEID__PLACEHOLDER__
              • 0x14628:$s1: __TREEID__PLACEHOLDER__
              • 0x15690:$s1: __TREEID__PLACEHOLDER__
              • 0x166f8:$s1: __TREEID__PLACEHOLDER__
              • 0x17760:$s1: __TREEID__PLACEHOLDER__
              • 0x187c8:$s1: __TREEID__PLACEHOLDER__
              • 0x19830:$s1: __TREEID__PLACEHOLDER__
              • 0x1a898:$s1: __TREEID__PLACEHOLDER__
              • 0x1b900:$s1: __TREEID__PLACEHOLDER__
              • 0x1bb14:$s1: __TREEID__PLACEHOLDER__
              • 0x1bb74:$s1: __TREEID__PLACEHOLDER__
              • 0x1f244:$s1: __TREEID__PLACEHOLDER__
              • 0x1f2c0:$s1: __TREEID__PLACEHOLDER__
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T19:05:00.510229+010020315153Misc activity104.16.167.22880192.168.2.549704TCP
              2025-01-15T19:05:01.163704+010020315153Misc activity104.16.167.22880192.168.2.549705TCP
              2025-01-15T19:05:03.303029+010020315153Misc activity104.16.167.22880192.168.2.549724TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T19:04:59.994942+010020242911A Network Trojan was detected192.168.2.5502551.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T19:04:54.897445+010020242981A Network Trojan was detected192.168.2.550379104.16.167.22880TCP
              2025-01-15T19:05:00.510217+010020242981A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T19:05:01.162958+010020242981A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T19:05:03.302302+010020242981A Network Trojan was detected192.168.2.549724104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T19:04:54.897445+010020242991A Network Trojan was detected192.168.2.550379104.16.167.22880TCP
              2025-01-15T19:05:00.510217+010020242991A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T19:05:01.162958+010020242991A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T19:05:03.302302+010020242991A Network Trojan was detected192.168.2.549724104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T19:04:54.897445+010020243011A Network Trojan was detected192.168.2.550379104.16.167.22880TCP
              2025-01-15T19:05:00.510217+010020243011A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T19:05:01.162958+010020243011A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T19:05:03.302302+010020243011A Network Trojan was detected192.168.2.549724104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T19:04:54.897445+010020243021A Network Trojan was detected192.168.2.550379104.16.167.22880TCP
              2025-01-15T19:05:00.510217+010020243021A Network Trojan was detected192.168.2.549704104.16.167.22880TCP
              2025-01-15T19:05:01.162958+010020243021A Network Trojan was detected192.168.2.549705104.16.167.22880TCP
              2025-01-15T19:05:03.302302+010020243021A Network Trojan was detected192.168.2.549724104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T19:04:54.897445+010028033043Unknown Traffic192.168.2.550379104.16.167.22880TCP
              2025-01-15T19:05:00.510217+010028033043Unknown Traffic192.168.2.549704104.16.167.22880TCP
              2025-01-15T19:05:01.162958+010028033043Unknown Traffic192.168.2.549705104.16.167.22880TCP
              2025-01-15T19:05:03.302302+010028033043Unknown Traffic192.168.2.549724104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: ImPgtzz6o4.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 96%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 96%
              Source: ImPgtzz6o4.dllVirustotal: Detection: 94%Perma Link
              Source: ImPgtzz6o4.dllReversingLabs: Detection: 94%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: ImPgtzz6o4.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 8_2_004018B9 CryptReleaseContext,8_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: ImPgtzz6o4.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49724 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49724 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49724 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49724 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:50379 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:50379 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:50379 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:50379 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 18:05:00 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9027ca9dbddd4332-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 18:05:01 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9027caa1b8f4425f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 18:05:03 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9027caaf0c1441bd-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: unknownNetwork traffic detected: IP country count 10
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.5:50255 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49724 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49704 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.5:49724
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.5:49704
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.5:49705
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:50379 -> 104.16.167.228:80
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.151
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.151
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.151
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.151
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.11
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.11
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.11
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.11
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.1
              Source: unknownTCP traffic detected without corresponding DNS query: 134.49.104.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.24
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.24
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.24
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.24
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 32.155.22.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 103.134.218.1
              Source: unknownTCP traffic detected without corresponding DNS query: 77.208.234.26
              Source: unknownTCP traffic detected without corresponding DNS query: 77.208.234.26
              Source: unknownTCP traffic detected without corresponding DNS query: 77.208.234.26
              Source: unknownTCP traffic detected without corresponding DNS query: 77.208.234.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: ImPgtzz6o4.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000005.00000002.2066977853.0000000000B5E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.2066977853.0000000000BBF000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.2081988829.0000000000D98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.2081988829.0000000000DCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2
              Source: mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6
              Source: mssecsvc.exe, 0000000A.00000002.2081988829.0000000000D98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8=
              Source: mssecsvc.exe, 00000005.00000002.2066977853.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/;L
              Source: mssecsvc.exe, 0000000A.00000002.2081988829.0000000000DCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/F
              Source: mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s
              Source: mssecsvc.exe, 00000007.00000002.2694333207.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000005.00000002.2066977853.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comNL8
              Source: mssecsvc.exe, 0000000A.00000002.2081988829.0000000000D98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comS=
              Source: mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comm
              Source: mssecsvc.exe, 0000000A.00000002.2081988829.0000000000DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,memcmp,strrchr,GlobalAlloc,_local_unwind2, WANACRY!8_2_004014A6
              Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,memcmp,strrchr,GlobalAlloc,_local_unwind2, WANACRY!8_2_004014B3
              Source: Yara matchFile source: ImPgtzz6o4.dll, type: SAMPLE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23dd948.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ee4128.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23dd948.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ec1104.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23ce8c8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ee4128.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ec1104.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23d98e8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ebd0a4.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000000.2043608275.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2081398569.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000000.2051736271.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2072388657.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2066445961.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2081543640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2695471506.0000000001EC1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2695874221.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000000.2051858668.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.2043732457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2072523212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4296, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1472, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6572, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: ImPgtzz6o4.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: ImPgtzz6o4.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1eb2084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23ce8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23dd948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23dd948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.23dd948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ee4128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ee4128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1ee4128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.23dd948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23dd948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ec1104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ec1104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.1ec1104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.23ce8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23ce8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ee4128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ee4128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1ee4128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ec1104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ec1104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.23d98e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23d98e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1ebd0a4.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ebd0a4.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.2080438903.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.2064004861.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.2080853616.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.2081543640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2695471506.0000000001EC1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2695874221.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000000.2051858668.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.2043732457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.2072523212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 8_2_00406C408_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 8_2_00402A768_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 8_2_00402E7E8_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 8_2_0040350F8_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 8_2_00404C198_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 8_2_0040541F8_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 8_2_004037978_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 8_2_004043B78_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 8_2_004031BC8_2_004031BC
              Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: ImPgtzz6o4.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: ImPgtzz6o4.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: ImPgtzz6o4.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1eb2084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23ce8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23dd948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23dd948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.23dd948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ee4128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ee4128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1ee4128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.23dd948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23dd948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ec1104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ec1104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.1ec1104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.23ce8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23ce8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1eb2084.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ee4128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ee4128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1ee4128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ec1104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ec1104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.23d98e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23d98e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1ebd0a4.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ebd0a4.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.2080438903.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.2064004861.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.2080853616.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.2081543640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2695471506.0000000001EC1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2695874221.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000000.2051858668.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.2043732457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.2072523212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000B.00000000.2080438903.000000000040E000.00000008.00000001.01000000.00000007.sdmp, ImPgtzz6o4.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6504:120:WilError_03
              Source: ImPgtzz6o4.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ImPgtzz6o4.dll,PlayGame
              Source: ImPgtzz6o4.dllVirustotal: Detection: 94%
              Source: ImPgtzz6o4.dllReversingLabs: Detection: 94%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ImPgtzz6o4.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ImPgtzz6o4.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: ImPgtzz6o4.dllStatic file information: File size 5267459 > 1048576
              Source: ImPgtzz6o4.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 8_2_00407710 push eax; ret 8_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 8_2_004076C8 push eax; ret 8_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 728Thread sleep count: 92 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 728Thread sleep time: -184000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5852Thread sleep count: 126 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 5852Thread sleep count: 51 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 728Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000005.00000002.2066977853.0000000000BC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWt8Z
              Source: mssecsvc.exe, 00000005.00000002.2066977853.0000000000B5E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.2066977853.0000000000BC6000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.2695025481.0000000000D7D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000003.2058714772.0000000000D7D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.2081988829.0000000000DEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 0000000A.00000002.2081988829.0000000000D98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhP
              Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 8_2_004029CC free,GetProcessHeap,HeapFree,8_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1Jump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592106 Sample: ImPgtzz6o4.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.102 unknown unknown 12->45 47 192.168.2.103 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              ImPgtzz6o4.dll94%VirustotalBrowse
              ImPgtzz6o4.dll95%ReversingLabsWin32.Ransomware.WannaCry
              ImPgtzz6o4.dll100%AviraTR/AD.WannaCry.zbqny
              ImPgtzz6o4.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)96%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe96%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comS=0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comNL80%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comm0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comImPgtzz6o4.dllfalse
                    high
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/smssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commmssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comNL8mssecsvc.exe, 00000005.00000002.2066977853.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/8=mssecsvc.exe, 0000000A.00000002.2081988829.0000000000D98000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Fmssecsvc.exe, 0000000A.00000002.2081988829.0000000000DCD000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/;Lmssecsvc.exe, 00000005.00000002.2066977853.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.kryptoslogic.commssecsvc.exe, 0000000A.00000002.2081988829.0000000000DFA000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comS=mssecsvc.exe, 0000000A.00000002.2081988829.0000000000D98000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6mssecsvc.exe, 00000007.00000002.2695025481.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000007.00000002.2694333207.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    80.165.219.37
                                    unknownDenmark
                                    3292TDCTDCASDKfalse
                                    31.57.181.202
                                    unknownIran (ISLAMIC Republic Of)
                                    31549RASANAIRfalse
                                    28.233.50.1
                                    unknownUnited States
                                    7922COMCAST-7922USfalse
                                    70.179.99.57
                                    unknownUnited States
                                    22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
                                    70.179.99.1
                                    unknownUnited States
                                    22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
                                    216.45.203.2
                                    unknownUnited States
                                    33659CMCSUSfalse
                                    216.45.203.1
                                    unknownUnited States
                                    33659CMCSUSfalse
                                    179.117.52.1
                                    unknownBrazil
                                    26599TELEFONICABRASILSABRfalse
                                    134.49.104.11
                                    unknownUnited States
                                    23138FIRST-STEPUSfalse
                                    114.75.42.141
                                    unknownAustralia
                                    4804MPX-ASMicroplexPTYLTDAUfalse
                                    218.64.246.1
                                    unknownChina
                                    4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                    14.80.182.1
                                    unknownKorea Republic of
                                    4766KIXS-AS-KRKoreaTelecomKRfalse
                                    80.165.219.1
                                    unknownDenmark
                                    3292TDCTDCASDKfalse
                                    42.34.73.1
                                    unknownKorea Republic of
                                    9644SKTELECOM-NET-ASSKTelecomKRfalse
                                    1.54.112.1
                                    unknownViet Nam
                                    18403FPT-AS-APTheCorporationforFinancingPromotingTechnolofalse
                                    121.161.175.1
                                    unknownKorea Republic of
                                    4766KIXS-AS-KRKoreaTelecomKRfalse
                                    42.34.73.2
                                    unknownKorea Republic of
                                    9644SKTELECOM-NET-ASSKTelecomKRfalse
                                    42.34.73.141
                                    unknownKorea Republic of
                                    9644SKTELECOM-NET-ASSKTelecomKRfalse
                                    200.211.71.1
                                    unknownBrazil
                                    4230CLAROSABRfalse
                                    200.211.71.2
                                    unknownBrazil
                                    4230CLAROSABRfalse
                                    114.33.204.1
                                    unknownTaiwan; Republic of China (ROC)
                                    3462HINETDataCommunicationBusinessGroupTWfalse
                                    IP
                                    192.168.2.148
                                    192.168.2.149
                                    192.168.2.146
                                    192.168.2.147
                                    192.168.2.140
                                    192.168.2.141
                                    192.168.2.144
                                    192.168.2.145
                                    192.168.2.142
                                    192.168.2.143
                                    192.168.2.159
                                    192.168.2.157
                                    192.168.2.158
                                    192.168.2.151
                                    192.168.2.152
                                    192.168.2.150
                                    192.168.2.155
                                    192.168.2.156
                                    192.168.2.153
                                    192.168.2.154
                                    192.168.2.126
                                    192.168.2.247
                                    192.168.2.127
                                    192.168.2.248
                                    192.168.2.124
                                    192.168.2.245
                                    192.168.2.125
                                    192.168.2.246
                                    192.168.2.128
                                    192.168.2.249
                                    192.168.2.129
                                    192.168.2.240
                                    192.168.2.122
                                    192.168.2.243
                                    192.168.2.123
                                    192.168.2.244
                                    192.168.2.120
                                    192.168.2.241
                                    192.168.2.121
                                    192.168.2.242
                                    192.168.2.97
                                    192.168.2.137
                                    192.168.2.96
                                    192.168.2.138
                                    192.168.2.99
                                    192.168.2.135
                                    192.168.2.98
                                    192.168.2.136
                                    192.168.2.139
                                    192.168.2.250
                                    192.168.2.130
                                    192.168.2.251
                                    192.168.2.91
                                    192.168.2.90
                                    192.168.2.93
                                    192.168.2.133
                                    192.168.2.254
                                    192.168.2.92
                                    192.168.2.134
                                    192.168.2.95
                                    192.168.2.131
                                    192.168.2.252
                                    192.168.2.94
                                    192.168.2.132
                                    192.168.2.253
                                    192.168.2.104
                                    192.168.2.225
                                    192.168.2.105
                                    192.168.2.226
                                    192.168.2.102
                                    192.168.2.223
                                    192.168.2.103
                                    192.168.2.224
                                    192.168.2.108
                                    192.168.2.229
                                    192.168.2.109
                                    192.168.2.106
                                    192.168.2.227
                                    192.168.2.107
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1592106
                                    Start date and time:2025-01-15 19:04:07 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 33s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:14
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:ImPgtzz6o4.dll
                                    renamed because original name is a hash value
                                    Original Sample Name:269d6a38de8ff33cb033509ef49dd7d2.dll
                                    Detection:MAL
                                    Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .dll
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                    • Excluded IPs from analysis (whitelisted): 199.232.214.172, 2.23.77.188, 20.109.210.53, 13.107.246.45
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target tasksche.exe, PID 3092 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    13:05:01API Interceptor1x Sleep call for process: loaddll32.exe modified
                                    13:05:35API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comET6LdJaK54.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    GeW4GzT8G8.dllGet hashmaliciousVirut, WannacryBrowse
                                    • 104.16.166.228
                                    JRTn7b1kHg.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.166.228
                                    alN48K3xcD.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    XB6SkLK7Al.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    COMCAST-7922UStxWVWM8Kx4.dllGet hashmaliciousWannacryBrowse
                                    • 29.147.136.127
                                    f5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                                    • 76.104.214.135
                                    hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                    • 25.38.30.167
                                    q4e7rZQEkL.dllGet hashmaliciousWannacryBrowse
                                    • 25.8.63.166
                                    Gn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                    • 96.217.134.1
                                    zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                    • 73.4.193.160
                                    bot.x86.elfGet hashmaliciousUnknownBrowse
                                    • 73.238.166.144
                                    bot.spc.elfGet hashmaliciousUnknownBrowse
                                    • 73.81.79.182
                                    bot.arm5.elfGet hashmaliciousUnknownBrowse
                                    • 25.43.128.193
                                    bot.mips.elfGet hashmaliciousUnknownBrowse
                                    • 25.152.125.12
                                    RASANAIRmeth9.elfGet hashmaliciousMiraiBrowse
                                    • 94.183.231.100
                                    5.elfGet hashmaliciousUnknownBrowse
                                    • 31.57.157.23
                                    res.x86.elfGet hashmaliciousUnknownBrowse
                                    • 31.59.173.220
                                    3.elfGet hashmaliciousUnknownBrowse
                                    • 151.239.206.255
                                    armv4l.elfGet hashmaliciousUnknownBrowse
                                    • 31.59.90.149
                                    Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                                    • 151.241.96.248
                                    sora.sh4.elfGet hashmaliciousUnknownBrowse
                                    • 151.245.34.0
                                    6.elfGet hashmaliciousUnknownBrowse
                                    • 151.246.207.141
                                    momo.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 151.239.81.215
                                    1.elfGet hashmaliciousUnknownBrowse
                                    • 31.57.182.18
                                    TDCTDCASDKbot.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 2.111.189.161
                                    bot.arm.elfGet hashmaliciousUnknownBrowse
                                    • 194.239.163.3
                                    xd.arm.elfGet hashmaliciousMiraiBrowse
                                    • 195.184.42.199
                                    xd.ppc.elfGet hashmaliciousMiraiBrowse
                                    • 83.88.79.102
                                    x86_64.elfGet hashmaliciousMiraiBrowse
                                    • 188.180.166.194
                                    bopY0ot9wf.dllGet hashmaliciousWannacryBrowse
                                    • 80.198.199.1
                                    meth10.elfGet hashmaliciousMiraiBrowse
                                    • 87.51.233.45
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 80.62.221.221
                                    spc.elfGet hashmaliciousUnknownBrowse
                                    • 83.92.253.137
                                    meth6.elfGet hashmaliciousMiraiBrowse
                                    • 93.163.13.125
                                    No context
                                    No context
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):7.996084447969248
                                    Encrypted:true
                                    SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWas593R8yAVp2Hj:QqPe1Cxcxk3ZAEUaszR8yc4Hj
                                    MD5:FCBC058EEAB7FD8C9B6FE129EEFF2C88
                                    SHA1:101102DFEA60D85D5F650D45EF17AB5F02ADA179
                                    SHA-256:B4C9512EA0D78F7E41FA3B585484D080026A3599E931A4CE4939EA890CF5D411
                                    SHA-512:6F1A484D71CF9C1113C5D5E400D02F83B695076954D7E0B70630751A8E04D3672B0EF905BAEB3A932F3288C88BDD425B5ED8679608E97E30B20ED6CA27820834
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 96%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\mssecsvc.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):3514368
                                    Entropy (8bit):7.996084447969248
                                    Encrypted:true
                                    SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWas593R8yAVp2Hj:QqPe1Cxcxk3ZAEUaszR8yc4Hj
                                    MD5:FCBC058EEAB7FD8C9B6FE129EEFF2C88
                                    SHA1:101102DFEA60D85D5F650D45EF17AB5F02ADA179
                                    SHA-256:B4C9512EA0D78F7E41FA3B585484D080026A3599E931A4CE4939EA890CF5D411
                                    SHA-512:6F1A484D71CF9C1113C5D5E400D02F83B695076954D7E0B70630751A8E04D3672B0EF905BAEB3A932F3288C88BDD425B5ED8679608E97E30B20ED6CA27820834
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 96%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):6.412674154769448
                                    TrID:
                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                    • DOS Executable Generic (2002/1) 0.20%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:ImPgtzz6o4.dll
                                    File size:5'267'459 bytes
                                    MD5:269d6a38de8ff33cb033509ef49dd7d2
                                    SHA1:f5c2049a17b5c3b6d3ba93f06a61ad8ae264fb60
                                    SHA256:62e9391e7aada2e5c0ee36f418c78da93bafc6db05fc05ca8a7dce824ced2e62
                                    SHA512:857270c1bfd4a770b41518275c57cea2f6444b09e63b7bfd557d8ecb8ef29e358078975ef24ede10771ac0510a09146b7fa51a2ef65ce74d51a72ab3787c228c
                                    SSDEEP:98304:+DqPoBhz1aRxcSUDk36SAEdhvxWas593R8yAVp2H:+DqPe1Cxcxk3ZAEUaszR8yc4H
                                    TLSH:F0363394653CA2FCE0450EB44463896B77B33C69A7BA5B1F87C042BB0D53B9BAFD0641
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                    Icon Hash:7ae282899bbab082
                                    Entrypoint:0x100011e9
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x10000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                    DLL Characteristics:
                                    Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    push ebx
                                    mov ebx, dword ptr [ebp+08h]
                                    push esi
                                    mov esi, dword ptr [ebp+0Ch]
                                    push edi
                                    mov edi, dword ptr [ebp+10h]
                                    test esi, esi
                                    jne 00007F0F348839BBh
                                    cmp dword ptr [10003140h], 00000000h
                                    jmp 00007F0F348839D8h
                                    cmp esi, 01h
                                    je 00007F0F348839B7h
                                    cmp esi, 02h
                                    jne 00007F0F348839D4h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007F0F348839BBh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    test eax, eax
                                    je 00007F0F348839BEh
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007F0F348838CAh
                                    test eax, eax
                                    jne 00007F0F348839B6h
                                    xor eax, eax
                                    jmp 00007F0F34883A00h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007F0F3488377Ch
                                    cmp esi, 01h
                                    mov dword ptr [ebp+0Ch], eax
                                    jne 00007F0F348839BEh
                                    test eax, eax
                                    jne 00007F0F348839E9h
                                    push edi
                                    push eax
                                    push ebx
                                    call 00007F0F348838A6h
                                    test esi, esi
                                    je 00007F0F348839B7h
                                    cmp esi, 03h
                                    jne 00007F0F348839D8h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007F0F34883895h
                                    test eax, eax
                                    jne 00007F0F348839B5h
                                    and dword ptr [ebp+0Ch], eax
                                    cmp dword ptr [ebp+0Ch], 00000000h
                                    je 00007F0F348839C3h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007F0F348839BAh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    mov dword ptr [ebp+0Ch], eax
                                    mov eax, dword ptr [ebp+0Ch]
                                    pop edi
                                    pop esi
                                    pop ebx
                                    pop ebp
                                    retn 000Ch
                                    jmp dword ptr [10002028h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    Programming Language:
                                    • [ C ] VS98 (6.0) build 8168
                                    • [C++] VS98 (6.0) build 8168
                                    • [RES] VS98 (6.0) cvtres build 1720
                                    • [LNK] VS98 (6.0) imp/exp build 8168
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x40000x5000600x5010003cf6d803a9bfee2179a089aff753b792unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    W0x40600x500000dataEnglishUnited States0.8770942687988281
                                    DLLImport
                                    KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                    MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                    NameOrdinalAddress
                                    PlayGame10x10001114
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-15T19:04:54.897445+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.550379104.16.167.22880TCP
                                    2025-01-15T19:04:54.897445+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.550379104.16.167.22880TCP
                                    2025-01-15T19:04:54.897445+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.550379104.16.167.22880TCP
                                    2025-01-15T19:04:54.897445+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.550379104.16.167.22880TCP
                                    2025-01-15T19:04:54.897445+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.550379104.16.167.22880TCP
                                    2025-01-15T19:04:59.994942+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.5502551.1.1.153UDP
                                    2025-01-15T19:05:00.510217+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549704104.16.167.22880TCP
                                    2025-01-15T19:05:00.510217+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549704104.16.167.22880TCP
                                    2025-01-15T19:05:00.510217+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549704104.16.167.22880TCP
                                    2025-01-15T19:05:00.510217+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549704104.16.167.22880TCP
                                    2025-01-15T19:05:00.510217+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549704104.16.167.22880TCP
                                    2025-01-15T19:05:00.510229+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.549704TCP
                                    2025-01-15T19:05:01.162958+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549705104.16.167.22880TCP
                                    2025-01-15T19:05:01.162958+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549705104.16.167.22880TCP
                                    2025-01-15T19:05:01.162958+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549705104.16.167.22880TCP
                                    2025-01-15T19:05:01.162958+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549705104.16.167.22880TCP
                                    2025-01-15T19:05:01.162958+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549705104.16.167.22880TCP
                                    2025-01-15T19:05:01.163704+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.549705TCP
                                    2025-01-15T19:05:03.302302+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549724104.16.167.22880TCP
                                    2025-01-15T19:05:03.302302+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549724104.16.167.22880TCP
                                    2025-01-15T19:05:03.302302+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549724104.16.167.22880TCP
                                    2025-01-15T19:05:03.302302+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549724104.16.167.22880TCP
                                    2025-01-15T19:05:03.302302+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549724104.16.167.22880TCP
                                    2025-01-15T19:05:03.303029+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.549724TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 19:04:54.897444963 CET49675443192.168.2.523.1.237.91
                                    Jan 15, 2025 19:04:54.897449017 CET49674443192.168.2.523.1.237.91
                                    Jan 15, 2025 19:04:54.991151094 CET49673443192.168.2.523.1.237.91
                                    Jan 15, 2025 19:05:00.009531975 CET4970480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.015018940 CET8049704104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:00.015105009 CET4970480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.015273094 CET4970480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.020128012 CET8049704104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:00.510018110 CET8049704104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:00.510216951 CET4970480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.510229111 CET8049704104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:00.510287046 CET4970480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.520728111 CET4970480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.525583982 CET8049704104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:00.671757936 CET4970580192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.676805019 CET8049705104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:00.676903009 CET4970580192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.677023888 CET4970580192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:00.681926012 CET8049705104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:01.162854910 CET8049705104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:01.162957907 CET4970580192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:01.163703918 CET8049705104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:01.163774014 CET4970580192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:01.164633989 CET4970580192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:01.169476986 CET8049705104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:01.259408951 CET49706445192.168.2.5103.134.218.151
                                    Jan 15, 2025 19:05:01.264405012 CET44549706103.134.218.151192.168.2.5
                                    Jan 15, 2025 19:05:01.264487028 CET49706445192.168.2.5103.134.218.151
                                    Jan 15, 2025 19:05:01.265270948 CET49706445192.168.2.5103.134.218.151
                                    Jan 15, 2025 19:05:01.265489101 CET49707445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:01.270131111 CET44549706103.134.218.151192.168.2.5
                                    Jan 15, 2025 19:05:01.270201921 CET49706445192.168.2.5103.134.218.151
                                    Jan 15, 2025 19:05:01.270272017 CET44549707103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:01.270404100 CET49707445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:01.270528078 CET49707445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:01.275418997 CET44549707103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:01.275554895 CET49707445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:01.276849985 CET49708445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:01.281687021 CET44549708103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:01.281764984 CET49708445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:01.281872988 CET49708445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:01.286668062 CET44549708103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:02.779392958 CET4972480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:02.784373999 CET8049724104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:02.785677910 CET4972480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:02.785938025 CET4972480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:02.790791035 CET8049724104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:03.261130095 CET49731445192.168.2.5134.49.104.11
                                    Jan 15, 2025 19:05:03.266211033 CET44549731134.49.104.11192.168.2.5
                                    Jan 15, 2025 19:05:03.266299963 CET49731445192.168.2.5134.49.104.11
                                    Jan 15, 2025 19:05:03.266416073 CET49731445192.168.2.5134.49.104.11
                                    Jan 15, 2025 19:05:03.266604900 CET49732445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:03.271503925 CET44549731134.49.104.11192.168.2.5
                                    Jan 15, 2025 19:05:03.271534920 CET44549732134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:03.271568060 CET49731445192.168.2.5134.49.104.11
                                    Jan 15, 2025 19:05:03.271614075 CET49732445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:03.271676064 CET49732445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:03.273586988 CET49733445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:03.278446913 CET44549733134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:03.278525114 CET49733445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:03.278579950 CET49733445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:03.278783083 CET44549732134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:03.278837919 CET49732445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:03.283404112 CET44549733134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:03.302192926 CET8049724104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:03.302301884 CET4972480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:03.302494049 CET4972480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:03.303029060 CET8049724104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:03.303077936 CET4972480192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:05:03.307333946 CET8049724104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:05:03.519043922 CET44549708103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:03.519820929 CET49708445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:03.519887924 CET49708445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:03.519970894 CET49708445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:03.525089979 CET44549708103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:03.525322914 CET44549708103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:04.506783962 CET49674443192.168.2.523.1.237.91
                                    Jan 15, 2025 19:05:04.506800890 CET49675443192.168.2.523.1.237.91
                                    Jan 15, 2025 19:05:04.600560904 CET49673443192.168.2.523.1.237.91
                                    Jan 15, 2025 19:05:05.273947001 CET49753445192.168.2.532.155.22.24
                                    Jan 15, 2025 19:05:05.279153109 CET4454975332.155.22.24192.168.2.5
                                    Jan 15, 2025 19:05:05.279244900 CET49753445192.168.2.532.155.22.24
                                    Jan 15, 2025 19:05:05.279289007 CET49753445192.168.2.532.155.22.24
                                    Jan 15, 2025 19:05:05.279495001 CET49754445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:05.285197020 CET4454975432.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:05.285265923 CET49754445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:05.285284042 CET4454975332.155.22.24192.168.2.5
                                    Jan 15, 2025 19:05:05.285334110 CET49754445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:05.285346031 CET49753445192.168.2.532.155.22.24
                                    Jan 15, 2025 19:05:05.286546946 CET49755445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:05.291086912 CET4454975432.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:05.291148901 CET49754445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:05.291385889 CET4454975532.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:05.291450977 CET49755445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:05.291486979 CET49755445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:05.296354055 CET4454975532.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:06.266614914 CET4434970323.1.237.91192.168.2.5
                                    Jan 15, 2025 19:05:06.266720057 CET49703443192.168.2.523.1.237.91
                                    Jan 15, 2025 19:05:06.522768021 CET49771445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:06.527673006 CET44549771103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:06.527776957 CET49771445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:06.527817011 CET49771445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:06.532614946 CET44549771103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:07.363194942 CET49778445192.168.2.577.208.234.26
                                    Jan 15, 2025 19:05:07.368252039 CET4454977877.208.234.26192.168.2.5
                                    Jan 15, 2025 19:05:07.368323088 CET49778445192.168.2.577.208.234.26
                                    Jan 15, 2025 19:05:07.368423939 CET49778445192.168.2.577.208.234.26
                                    Jan 15, 2025 19:05:07.368676901 CET49779445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:07.373560905 CET4454977977.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:07.373629093 CET49779445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:07.373718023 CET49779445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:07.373753071 CET4454977877.208.234.26192.168.2.5
                                    Jan 15, 2025 19:05:07.373810053 CET49778445192.168.2.577.208.234.26
                                    Jan 15, 2025 19:05:07.378604889 CET4454977977.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:07.378663063 CET49779445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:07.386935949 CET49780445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:07.391818047 CET4454978077.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:07.391889095 CET49780445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:07.392062902 CET49780445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:07.396912098 CET4454978077.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:08.789964914 CET44549771103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:08.790117979 CET49771445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:08.790167093 CET49771445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:08.790224075 CET49771445192.168.2.5103.134.218.1
                                    Jan 15, 2025 19:05:08.795124054 CET44549771103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:08.795156002 CET44549771103.134.218.1192.168.2.5
                                    Jan 15, 2025 19:05:08.851754904 CET49797445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:08.857227087 CET44549797103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:08.857316971 CET49797445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:08.857347965 CET49797445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:08.858330011 CET49798445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:08.863823891 CET44549797103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:08.863873959 CET44549798103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:08.863975048 CET49798445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:08.864007950 CET49798445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:08.864017010 CET49797445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:08.869389057 CET44549798103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:09.367716074 CET49804445192.168.2.548.158.167.161
                                    Jan 15, 2025 19:05:09.373228073 CET4454980448.158.167.161192.168.2.5
                                    Jan 15, 2025 19:05:09.373415947 CET49804445192.168.2.548.158.167.161
                                    Jan 15, 2025 19:05:09.373459101 CET49804445192.168.2.548.158.167.161
                                    Jan 15, 2025 19:05:09.373687983 CET49805445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:09.378689051 CET4454980548.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:09.378787041 CET49805445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:09.378865957 CET49805445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:09.379091978 CET4454980448.158.167.161192.168.2.5
                                    Jan 15, 2025 19:05:09.379168987 CET49804445192.168.2.548.158.167.161
                                    Jan 15, 2025 19:05:09.380170107 CET49806445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:09.384196997 CET4454980548.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:09.384268999 CET49805445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:09.385118008 CET4454980648.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:09.385210037 CET49806445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:09.385267973 CET49806445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:09.390110016 CET4454980648.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:11.383688927 CET49826445192.168.2.555.228.135.233
                                    Jan 15, 2025 19:05:11.389427900 CET4454982655.228.135.233192.168.2.5
                                    Jan 15, 2025 19:05:11.389539003 CET49826445192.168.2.555.228.135.233
                                    Jan 15, 2025 19:05:11.389585018 CET49826445192.168.2.555.228.135.233
                                    Jan 15, 2025 19:05:11.389791012 CET49827445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:11.395401001 CET4454982755.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:11.395484924 CET49827445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:11.395536900 CET49827445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:11.395936012 CET4454982655.228.135.233192.168.2.5
                                    Jan 15, 2025 19:05:11.396002054 CET49826445192.168.2.555.228.135.233
                                    Jan 15, 2025 19:05:11.396648884 CET49828445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:11.403044939 CET4454982755.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:11.403076887 CET4454982855.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:11.403127909 CET49827445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:11.403182030 CET49828445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:11.403237104 CET49828445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:11.407984018 CET4454982855.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:13.397794008 CET49851445192.168.2.5216.45.203.20
                                    Jan 15, 2025 19:05:13.402688026 CET44549851216.45.203.20192.168.2.5
                                    Jan 15, 2025 19:05:13.402769089 CET49851445192.168.2.5216.45.203.20
                                    Jan 15, 2025 19:05:13.402806044 CET49851445192.168.2.5216.45.203.20
                                    Jan 15, 2025 19:05:13.403002024 CET49852445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:13.407836914 CET44549852216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:13.407928944 CET49852445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:13.407968998 CET49852445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:13.408055067 CET44549851216.45.203.20192.168.2.5
                                    Jan 15, 2025 19:05:13.408126116 CET49851445192.168.2.5216.45.203.20
                                    Jan 15, 2025 19:05:13.408229113 CET49853445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:13.412913084 CET44549852216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:13.412985086 CET49852445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:13.413074017 CET44549853216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:13.413149118 CET49853445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:13.413209915 CET49853445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:13.418070078 CET44549853216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:15.413582087 CET49876445192.168.2.542.34.73.141
                                    Jan 15, 2025 19:05:15.418358088 CET4454987642.34.73.141192.168.2.5
                                    Jan 15, 2025 19:05:15.418467045 CET49876445192.168.2.542.34.73.141
                                    Jan 15, 2025 19:05:15.418559074 CET49876445192.168.2.542.34.73.141
                                    Jan 15, 2025 19:05:15.418771029 CET49877445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:15.423470020 CET4454987642.34.73.141192.168.2.5
                                    Jan 15, 2025 19:05:15.423532963 CET49876445192.168.2.542.34.73.141
                                    Jan 15, 2025 19:05:15.423537016 CET4454987742.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:15.423607111 CET49877445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:15.423643112 CET49877445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:15.423990011 CET49878445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:15.428633928 CET4454987742.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:15.428716898 CET49877445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:15.428812981 CET4454987842.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:15.428875923 CET49878445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:15.428919077 CET49878445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:15.433674097 CET4454987842.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:17.429186106 CET49907445192.168.2.5162.221.124.222
                                    Jan 15, 2025 19:05:17.433985949 CET44549907162.221.124.222192.168.2.5
                                    Jan 15, 2025 19:05:17.434133053 CET49907445192.168.2.5162.221.124.222
                                    Jan 15, 2025 19:05:17.434133053 CET49907445192.168.2.5162.221.124.222
                                    Jan 15, 2025 19:05:17.434539080 CET49908445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:17.439275026 CET44549908162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:17.439531088 CET49908445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:17.439531088 CET49908445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:17.439821005 CET49909445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:17.440294981 CET44549907162.221.124.222192.168.2.5
                                    Jan 15, 2025 19:05:17.441557884 CET44549907162.221.124.222192.168.2.5
                                    Jan 15, 2025 19:05:17.441689014 CET49907445192.168.2.5162.221.124.222
                                    Jan 15, 2025 19:05:17.444643974 CET44549909162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:17.444874048 CET49909445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:17.444875002 CET49909445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:17.445372105 CET44549908162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:17.445540905 CET49908445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:17.449673891 CET44549909162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:19.445677042 CET49946445192.168.2.5218.64.246.135
                                    Jan 15, 2025 19:05:19.450571060 CET44549946218.64.246.135192.168.2.5
                                    Jan 15, 2025 19:05:19.450762033 CET49946445192.168.2.5218.64.246.135
                                    Jan 15, 2025 19:05:19.450781107 CET49946445192.168.2.5218.64.246.135
                                    Jan 15, 2025 19:05:19.451018095 CET49947445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:19.455816984 CET44549946218.64.246.135192.168.2.5
                                    Jan 15, 2025 19:05:19.455832958 CET44549947218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:19.455923080 CET49946445192.168.2.5218.64.246.135
                                    Jan 15, 2025 19:05:19.455991983 CET49947445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:19.456031084 CET49947445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:19.456371069 CET49948445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:19.460990906 CET44549947218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:19.461236954 CET44549948218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:19.461270094 CET49947445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:19.461766005 CET49948445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:19.461766005 CET49948445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:19.466567039 CET44549948218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:21.460553885 CET49973445192.168.2.514.80.182.156
                                    Jan 15, 2025 19:05:21.465456009 CET4454997314.80.182.156192.168.2.5
                                    Jan 15, 2025 19:05:21.465565920 CET49973445192.168.2.514.80.182.156
                                    Jan 15, 2025 19:05:21.465606928 CET49973445192.168.2.514.80.182.156
                                    Jan 15, 2025 19:05:21.465730906 CET49974445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:21.470518112 CET4454997414.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:21.470587015 CET49974445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:21.470616102 CET49974445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:21.470781088 CET4454997314.80.182.156192.168.2.5
                                    Jan 15, 2025 19:05:21.470980883 CET49975445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:21.470994949 CET49973445192.168.2.514.80.182.156
                                    Jan 15, 2025 19:05:21.475641012 CET4454997414.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:21.475735903 CET49974445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:21.475766897 CET4454997514.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:21.476134062 CET49975445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:21.476170063 CET49975445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:21.480978012 CET4454997514.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:23.476053953 CET49998445192.168.2.566.120.42.182
                                    Jan 15, 2025 19:05:23.480871916 CET4454999866.120.42.182192.168.2.5
                                    Jan 15, 2025 19:05:23.480935097 CET49998445192.168.2.566.120.42.182
                                    Jan 15, 2025 19:05:23.480957031 CET49998445192.168.2.566.120.42.182
                                    Jan 15, 2025 19:05:23.481101036 CET49999445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:23.485886097 CET4454999966.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:23.485896111 CET4454999866.120.42.182192.168.2.5
                                    Jan 15, 2025 19:05:23.485953093 CET49998445192.168.2.566.120.42.182
                                    Jan 15, 2025 19:05:23.485991001 CET49999445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:23.486032963 CET49999445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:23.486269951 CET50000445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:23.490952969 CET4454999966.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:23.491015911 CET49999445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:23.491096020 CET4455000066.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:23.491153002 CET50000445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:23.491178036 CET50000445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:23.496186972 CET4455000066.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:24.648663044 CET44549733134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:24.649892092 CET49733445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:24.649954081 CET49733445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:24.650022030 CET49733445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:24.654778004 CET44549733134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:24.654798031 CET44549733134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:25.491605043 CET50023445192.168.2.51.54.112.21
                                    Jan 15, 2025 19:05:25.496507883 CET445500231.54.112.21192.168.2.5
                                    Jan 15, 2025 19:05:25.497330904 CET50023445192.168.2.51.54.112.21
                                    Jan 15, 2025 19:05:25.497395992 CET50023445192.168.2.51.54.112.21
                                    Jan 15, 2025 19:05:25.497580051 CET50024445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:25.502736092 CET445500241.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:25.502758980 CET445500231.54.112.21192.168.2.5
                                    Jan 15, 2025 19:05:25.502818108 CET50023445192.168.2.51.54.112.21
                                    Jan 15, 2025 19:05:25.502831936 CET50024445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:25.502916098 CET50024445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:25.503108025 CET50025445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:25.508121014 CET445500241.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:25.508145094 CET445500251.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:25.508197069 CET50024445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:25.508220911 CET50025445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:25.508274078 CET50025445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:25.513402939 CET445500251.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:26.652842045 CET4454975532.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:26.653085947 CET49755445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:26.653085947 CET49755445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:26.653085947 CET49755445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:26.658706903 CET4454975532.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:26.658754110 CET4454975532.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:27.507453918 CET50032445192.168.2.528.233.50.14
                                    Jan 15, 2025 19:05:27.512391090 CET4455003228.233.50.14192.168.2.5
                                    Jan 15, 2025 19:05:27.512512922 CET50032445192.168.2.528.233.50.14
                                    Jan 15, 2025 19:05:27.512558937 CET50032445192.168.2.528.233.50.14
                                    Jan 15, 2025 19:05:27.512670040 CET50033445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:27.517483950 CET4455003328.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:27.517558098 CET50033445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:27.517584085 CET50033445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:27.517601967 CET4455003228.233.50.14192.168.2.5
                                    Jan 15, 2025 19:05:27.517724037 CET50032445192.168.2.528.233.50.14
                                    Jan 15, 2025 19:05:27.517951965 CET50034445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:27.522644043 CET4455003328.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:27.522716045 CET50033445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:27.522753954 CET4455003428.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:27.522816896 CET50034445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:27.522847891 CET50034445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:27.527581930 CET4455003428.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:27.663366079 CET50035445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:27.668328047 CET44550035134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:27.668406963 CET50035445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:27.668441057 CET50035445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:27.673218012 CET44550035134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:28.760591984 CET4454978077.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:28.760674953 CET49780445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:28.760755062 CET49780445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:28.760869980 CET49780445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:28.765712976 CET4454978077.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:28.765744925 CET4454978077.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:29.523051023 CET50036445192.168.2.5114.103.109.227
                                    Jan 15, 2025 19:05:29.528047085 CET44550036114.103.109.227192.168.2.5
                                    Jan 15, 2025 19:05:29.528239012 CET50036445192.168.2.5114.103.109.227
                                    Jan 15, 2025 19:05:29.528341055 CET50036445192.168.2.5114.103.109.227
                                    Jan 15, 2025 19:05:29.528350115 CET50037445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:29.533366919 CET44550037114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:29.533401012 CET44550036114.103.109.227192.168.2.5
                                    Jan 15, 2025 19:05:29.533457041 CET50037445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:29.533492088 CET50036445192.168.2.5114.103.109.227
                                    Jan 15, 2025 19:05:29.533534050 CET50037445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:29.533901930 CET50038445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:29.538680077 CET44550037114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:29.538743019 CET50037445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:29.538769007 CET44550038114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:29.538830996 CET50038445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:29.538857937 CET50038445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:29.543638945 CET44550038114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:29.663397074 CET50039445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:29.668270111 CET4455003932.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:29.668483973 CET50039445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:29.668523073 CET50039445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:29.673402071 CET4455003932.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:30.227391005 CET44549798103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:30.227829933 CET49798445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:30.227930069 CET49798445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:30.227978945 CET49798445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:30.232867002 CET44549798103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:30.232897997 CET44549798103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:30.743781090 CET4454980648.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:30.743885994 CET49806445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:30.743935108 CET49806445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:30.744048119 CET49806445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:30.748728991 CET4454980648.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:30.748873949 CET4454980648.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:31.538733959 CET50040445192.168.2.580.165.219.37
                                    Jan 15, 2025 19:05:31.543863058 CET4455004080.165.219.37192.168.2.5
                                    Jan 15, 2025 19:05:31.543970108 CET50040445192.168.2.580.165.219.37
                                    Jan 15, 2025 19:05:31.544012070 CET50040445192.168.2.580.165.219.37
                                    Jan 15, 2025 19:05:31.544214010 CET50041445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:31.549124956 CET4455004180.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:31.549137115 CET4455004080.165.219.37192.168.2.5
                                    Jan 15, 2025 19:05:31.549209118 CET50040445192.168.2.580.165.219.37
                                    Jan 15, 2025 19:05:31.549210072 CET50041445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:31.549515009 CET50042445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:31.554274082 CET4455004180.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:31.554336071 CET50041445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:31.554387093 CET4455004280.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:31.554455996 CET50042445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:31.554527044 CET50042445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:31.559305906 CET4455004280.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:31.772880077 CET50043445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:31.777910948 CET4455004377.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:31.778084993 CET50043445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:31.778141022 CET50043445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:31.783263922 CET4455004377.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:32.793533087 CET4454982855.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:32.793766022 CET49828445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:32.793766022 CET49828445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:32.793899059 CET49828445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:32.798872948 CET4454982855.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:32.798903942 CET4454982855.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:33.241604090 CET50044445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:33.247168064 CET44550044103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:33.247268915 CET50044445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:33.247328997 CET50044445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:33.252424955 CET44550044103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:33.561352015 CET50045445192.168.2.5114.33.204.13
                                    Jan 15, 2025 19:05:33.566346884 CET44550045114.33.204.13192.168.2.5
                                    Jan 15, 2025 19:05:33.566462040 CET50045445192.168.2.5114.33.204.13
                                    Jan 15, 2025 19:05:33.566571951 CET50045445192.168.2.5114.33.204.13
                                    Jan 15, 2025 19:05:33.566721916 CET50046445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:33.571623087 CET44550046114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:33.571708918 CET50046445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:33.571785927 CET50046445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:33.572068930 CET50047445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:33.572078943 CET44550045114.33.204.13192.168.2.5
                                    Jan 15, 2025 19:05:33.572148085 CET50045445192.168.2.5114.33.204.13
                                    Jan 15, 2025 19:05:33.576765060 CET44550046114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:33.576838970 CET50046445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:33.576886892 CET44550047114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:33.576951981 CET50047445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:33.581109047 CET50047445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:33.585978031 CET44550047114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:33.757371902 CET50048445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:33.762725115 CET4455004848.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:33.762976885 CET50048445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:33.762976885 CET50048445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:33.768362045 CET4455004848.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:34.775779009 CET44549853216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:34.776021957 CET49853445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:34.776123047 CET49853445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:34.776123047 CET49853445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:34.780975103 CET44549853216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:34.781042099 CET44549853216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:35.570641994 CET50049445192.168.2.5121.161.175.57
                                    Jan 15, 2025 19:05:35.643296003 CET44550049121.161.175.57192.168.2.5
                                    Jan 15, 2025 19:05:35.643438101 CET50049445192.168.2.5121.161.175.57
                                    Jan 15, 2025 19:05:35.643475056 CET50049445192.168.2.5121.161.175.57
                                    Jan 15, 2025 19:05:35.643863916 CET50050445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:35.650324106 CET44550050121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:35.650482893 CET50050445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:35.650571108 CET50050445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:35.650866032 CET50051445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:35.651957035 CET44550049121.161.175.57192.168.2.5
                                    Jan 15, 2025 19:05:35.652024984 CET50049445192.168.2.5121.161.175.57
                                    Jan 15, 2025 19:05:35.656636953 CET44550051121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:35.656677961 CET44550050121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:35.656708002 CET50051445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:35.656712055 CET44550050121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:35.656791925 CET50050445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:35.656800985 CET50051445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:35.662966013 CET44550051121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:35.804382086 CET50052445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:35.809884071 CET4455005255.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:35.810086966 CET50052445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:35.810086966 CET50052445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:35.815514088 CET4455005255.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:36.811300039 CET4454987842.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:36.811414957 CET49878445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:36.811512947 CET49878445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:36.811513901 CET49878445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:36.816919088 CET4454987842.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:36.816941977 CET4454987842.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:37.444967985 CET50053445192.168.2.5200.211.71.248
                                    Jan 15, 2025 19:05:37.450647116 CET44550053200.211.71.248192.168.2.5
                                    Jan 15, 2025 19:05:37.450743914 CET50053445192.168.2.5200.211.71.248
                                    Jan 15, 2025 19:05:37.450781107 CET50053445192.168.2.5200.211.71.248
                                    Jan 15, 2025 19:05:37.451154947 CET50054445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:37.456226110 CET44550054200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:37.456387997 CET50054445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:37.456387997 CET50054445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:37.456603050 CET44550053200.211.71.248192.168.2.5
                                    Jan 15, 2025 19:05:37.456681967 CET44550053200.211.71.248192.168.2.5
                                    Jan 15, 2025 19:05:37.456710100 CET50055445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:37.456742048 CET50053445192.168.2.5200.211.71.248
                                    Jan 15, 2025 19:05:37.461798906 CET44550055200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:37.461853981 CET44550054200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:37.461864948 CET50055445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:37.461962938 CET50055445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:37.461988926 CET50054445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:37.467000008 CET44550055200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:37.788470030 CET50056445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:37.793740034 CET44550056216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:37.793890953 CET50056445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:37.793941975 CET50056445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:37.799176931 CET44550056216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:38.842566967 CET44549909162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:38.842704058 CET49909445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:38.842765093 CET49909445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:38.842802048 CET49909445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:38.848148108 CET44549909162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:38.848192930 CET44549909162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:39.195081949 CET50057445192.168.2.5188.168.25.80
                                    Jan 15, 2025 19:05:39.200324059 CET44550057188.168.25.80192.168.2.5
                                    Jan 15, 2025 19:05:39.200423002 CET50057445192.168.2.5188.168.25.80
                                    Jan 15, 2025 19:05:39.200455904 CET50057445192.168.2.5188.168.25.80
                                    Jan 15, 2025 19:05:39.200640917 CET50058445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:05:39.205832958 CET44550058188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:05:39.205919981 CET50058445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:05:39.206001043 CET50058445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:05:39.206007004 CET44550057188.168.25.80192.168.2.5
                                    Jan 15, 2025 19:05:39.206063986 CET50057445192.168.2.5188.168.25.80
                                    Jan 15, 2025 19:05:39.206335068 CET50059445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:05:39.211564064 CET44550058188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:05:39.211611986 CET44550059188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:05:39.211626053 CET50058445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:05:39.211683989 CET50059445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:05:39.211716890 CET50059445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:05:39.216728926 CET44550059188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:05:39.231302977 CET44550055200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:39.231405973 CET50055445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:39.231483936 CET50055445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:39.231484890 CET50055445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:39.236865044 CET44550055200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:39.236962080 CET44550055200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:39.898787022 CET50060445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:39.903788090 CET4455006042.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:39.903888941 CET50060445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:39.907648087 CET50060445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:05:39.912477970 CET4455006042.34.73.1192.168.2.5
                                    Jan 15, 2025 19:05:40.835894108 CET50061445192.168.2.531.57.181.202
                                    Jan 15, 2025 19:05:40.840856075 CET4455006131.57.181.202192.168.2.5
                                    Jan 15, 2025 19:05:40.840981007 CET50061445192.168.2.531.57.181.202
                                    Jan 15, 2025 19:05:40.841064930 CET50061445192.168.2.531.57.181.202
                                    Jan 15, 2025 19:05:40.841257095 CET50062445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:40.846159935 CET4455006231.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:40.847084999 CET4455006131.57.181.202192.168.2.5
                                    Jan 15, 2025 19:05:40.847222090 CET50061445192.168.2.531.57.181.202
                                    Jan 15, 2025 19:05:40.847332954 CET50062445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:40.847332954 CET50062445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:40.847872972 CET50063445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:40.852442026 CET4455006231.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:40.852458000 CET4455006231.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:40.852545023 CET50062445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:40.852749109 CET4455006331.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:40.854477882 CET44549948218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:40.854645014 CET49948445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:40.854645014 CET50063445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:40.854645967 CET50063445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:40.854728937 CET49948445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:40.854775906 CET49948445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:40.859726906 CET4455006331.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:40.859745026 CET44549948218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:40.859757900 CET44549948218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:41.853866100 CET50064445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:41.858860970 CET44550064162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:41.858959913 CET50064445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:41.860599041 CET50064445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:05:41.865556955 CET44550064162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:05:42.243055105 CET50065445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:42.248306036 CET44550065200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:42.248414993 CET50065445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:42.248490095 CET50065445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:42.253348112 CET44550065200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:42.367892981 CET50066445192.168.2.5114.75.42.141
                                    Jan 15, 2025 19:05:42.373145103 CET44550066114.75.42.141192.168.2.5
                                    Jan 15, 2025 19:05:42.373337030 CET50066445192.168.2.5114.75.42.141
                                    Jan 15, 2025 19:05:42.373337984 CET50066445192.168.2.5114.75.42.141
                                    Jan 15, 2025 19:05:42.373393059 CET50067445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:05:42.378330946 CET44550067114.75.42.1192.168.2.5
                                    Jan 15, 2025 19:05:42.378400087 CET50067445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:05:42.378441095 CET50067445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:05:42.378500938 CET44550066114.75.42.141192.168.2.5
                                    Jan 15, 2025 19:05:42.378559113 CET50066445192.168.2.5114.75.42.141
                                    Jan 15, 2025 19:05:42.378731012 CET50068445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:05:42.383701086 CET44550067114.75.42.1192.168.2.5
                                    Jan 15, 2025 19:05:42.383780956 CET44550068114.75.42.1192.168.2.5
                                    Jan 15, 2025 19:05:42.383812904 CET50067445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:05:42.383862019 CET50068445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:05:42.383903980 CET50068445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:05:42.388804913 CET44550068114.75.42.1192.168.2.5
                                    Jan 15, 2025 19:05:42.434838057 CET4455006331.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:42.434938908 CET50063445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:42.435026884 CET50063445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:42.435026884 CET50063445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:42.440454960 CET4455006331.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:42.440495968 CET4455006331.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:42.836761951 CET4454997514.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:42.836994886 CET49975445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:42.836996078 CET49975445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:42.836996078 CET49975445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:42.842065096 CET4454997514.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:42.842096090 CET4454997514.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:43.788902044 CET50069445192.168.2.5179.117.52.128
                                    Jan 15, 2025 19:05:43.794344902 CET44550069179.117.52.128192.168.2.5
                                    Jan 15, 2025 19:05:43.794455051 CET50069445192.168.2.5179.117.52.128
                                    Jan 15, 2025 19:05:43.794552088 CET50069445192.168.2.5179.117.52.128
                                    Jan 15, 2025 19:05:43.794770956 CET50070445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:05:43.799734116 CET44550069179.117.52.128192.168.2.5
                                    Jan 15, 2025 19:05:43.799768925 CET44550070179.117.52.1192.168.2.5
                                    Jan 15, 2025 19:05:43.799798012 CET50069445192.168.2.5179.117.52.128
                                    Jan 15, 2025 19:05:43.799844027 CET50070445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:05:43.799901962 CET50070445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:05:43.800240993 CET50071445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:05:43.804915905 CET44550070179.117.52.1192.168.2.5
                                    Jan 15, 2025 19:05:43.804979086 CET50070445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:05:43.805108070 CET44550071179.117.52.1192.168.2.5
                                    Jan 15, 2025 19:05:43.805171967 CET50071445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:05:43.805207968 CET50071445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:05:43.810105085 CET44550071179.117.52.1192.168.2.5
                                    Jan 15, 2025 19:05:43.866769075 CET50072445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:43.871822119 CET44550072218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:43.871932983 CET50072445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:43.871978998 CET50072445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:05:43.876869917 CET44550072218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:05:44.011162043 CET44550065200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:44.011413097 CET50065445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:44.011414051 CET50065445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:44.011414051 CET50065445192.168.2.5200.211.71.1
                                    Jan 15, 2025 19:05:44.016599894 CET44550065200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:44.016638994 CET44550065200.211.71.1192.168.2.5
                                    Jan 15, 2025 19:05:44.069705963 CET50073445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:05:44.074666023 CET44550073200.211.71.2192.168.2.5
                                    Jan 15, 2025 19:05:44.074783087 CET50073445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:05:44.074939013 CET50073445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:05:44.075414896 CET50074445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:05:44.080099106 CET44550073200.211.71.2192.168.2.5
                                    Jan 15, 2025 19:05:44.080176115 CET50073445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:05:44.080281019 CET44550074200.211.71.2192.168.2.5
                                    Jan 15, 2025 19:05:44.080359936 CET50074445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:05:44.080406904 CET50074445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:05:44.085345030 CET44550074200.211.71.2192.168.2.5
                                    Jan 15, 2025 19:05:44.868019104 CET4455000066.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:44.868093014 CET50000445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:44.868160963 CET50000445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:44.868210077 CET50000445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:44.873284101 CET4455000066.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:44.873327971 CET4455000066.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:45.117026091 CET50075445192.168.2.598.145.173.220
                                    Jan 15, 2025 19:05:45.122037888 CET4455007598.145.173.220192.168.2.5
                                    Jan 15, 2025 19:05:45.123888969 CET50075445192.168.2.598.145.173.220
                                    Jan 15, 2025 19:05:45.123946905 CET50075445192.168.2.598.145.173.220
                                    Jan 15, 2025 19:05:45.124057055 CET50076445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:05:45.128969908 CET4455007698.145.173.1192.168.2.5
                                    Jan 15, 2025 19:05:45.129044056 CET50076445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:05:45.129085064 CET50076445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:05:45.129256010 CET50077445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:05:45.129616022 CET4455007598.145.173.220192.168.2.5
                                    Jan 15, 2025 19:05:45.129678011 CET50075445192.168.2.598.145.173.220
                                    Jan 15, 2025 19:05:45.134166956 CET4455007698.145.173.1192.168.2.5
                                    Jan 15, 2025 19:05:45.134198904 CET4455007798.145.173.1192.168.2.5
                                    Jan 15, 2025 19:05:45.134274960 CET50077445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:05:45.134282112 CET50076445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:05:45.134455919 CET50077445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:05:45.139292002 CET4455007798.145.173.1192.168.2.5
                                    Jan 15, 2025 19:05:45.455718040 CET50078445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:45.461150885 CET4455007831.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:45.461314917 CET50078445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:45.461952925 CET50078445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:45.466835976 CET4455007831.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:45.850985050 CET50079445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:45.855869055 CET4455007914.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:45.855993032 CET50079445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:45.856051922 CET50079445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:05:45.860867977 CET4455007914.80.182.1192.168.2.5
                                    Jan 15, 2025 19:05:46.351562977 CET50080445192.168.2.551.79.151.79
                                    Jan 15, 2025 19:05:46.356591940 CET4455008051.79.151.79192.168.2.5
                                    Jan 15, 2025 19:05:46.356703043 CET50080445192.168.2.551.79.151.79
                                    Jan 15, 2025 19:05:46.356760025 CET50080445192.168.2.551.79.151.79
                                    Jan 15, 2025 19:05:46.356837034 CET50081445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:05:46.361709118 CET4455008151.79.151.1192.168.2.5
                                    Jan 15, 2025 19:05:46.361732006 CET4455008051.79.151.79192.168.2.5
                                    Jan 15, 2025 19:05:46.361807108 CET50081445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:05:46.361807108 CET50080445192.168.2.551.79.151.79
                                    Jan 15, 2025 19:05:46.361886978 CET50081445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:05:46.362174988 CET50082445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:05:46.366858006 CET4455008151.79.151.1192.168.2.5
                                    Jan 15, 2025 19:05:46.366924047 CET50081445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:05:46.367099047 CET4455008251.79.151.1192.168.2.5
                                    Jan 15, 2025 19:05:46.367166996 CET50082445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:05:46.367204905 CET50082445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:05:46.372483969 CET4455008251.79.151.1192.168.2.5
                                    Jan 15, 2025 19:05:46.883148909 CET445500251.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:46.883264065 CET50025445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:46.883356094 CET50025445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:46.883356094 CET50025445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:46.888936996 CET445500251.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:46.888967991 CET445500251.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:47.043701887 CET4455007831.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:47.043941975 CET50078445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:47.044030905 CET50078445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:47.044080973 CET50078445192.168.2.531.57.181.1
                                    Jan 15, 2025 19:05:47.048896074 CET4455007831.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:47.049175024 CET4455007831.57.181.1192.168.2.5
                                    Jan 15, 2025 19:05:47.101069927 CET50083445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:47.106010914 CET4455008331.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:47.106159925 CET50083445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:47.106498003 CET50084445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:47.106503010 CET50083445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:47.111424923 CET4455008431.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:47.111454964 CET4455008331.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:47.111493111 CET50084445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:47.111526012 CET50083445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:47.111561060 CET50084445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:47.116375923 CET4455008431.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:47.507550001 CET50085445192.168.2.5105.127.28.37
                                    Jan 15, 2025 19:05:47.512411118 CET44550085105.127.28.37192.168.2.5
                                    Jan 15, 2025 19:05:47.512574911 CET50085445192.168.2.5105.127.28.37
                                    Jan 15, 2025 19:05:47.512594938 CET50085445192.168.2.5105.127.28.37
                                    Jan 15, 2025 19:05:47.512759924 CET50086445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:05:47.517638922 CET44550086105.127.28.1192.168.2.5
                                    Jan 15, 2025 19:05:47.517724991 CET50086445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:05:47.517735958 CET50086445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:05:47.518062115 CET50087445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:05:47.518102884 CET44550085105.127.28.37192.168.2.5
                                    Jan 15, 2025 19:05:47.518162012 CET50085445192.168.2.5105.127.28.37
                                    Jan 15, 2025 19:05:47.522821903 CET44550086105.127.28.1192.168.2.5
                                    Jan 15, 2025 19:05:47.522939920 CET50086445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:05:47.523053885 CET44550087105.127.28.1192.168.2.5
                                    Jan 15, 2025 19:05:47.523139000 CET50087445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:05:47.523190975 CET50087445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:05:47.528048038 CET44550087105.127.28.1192.168.2.5
                                    Jan 15, 2025 19:05:47.882369041 CET50088445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:47.887300014 CET4455008866.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:47.887404919 CET50088445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:47.887433052 CET50088445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:05:47.892201900 CET4455008866.120.42.1192.168.2.5
                                    Jan 15, 2025 19:05:48.585603952 CET50089445192.168.2.5111.41.150.25
                                    Jan 15, 2025 19:05:48.590565920 CET44550089111.41.150.25192.168.2.5
                                    Jan 15, 2025 19:05:48.590665102 CET50089445192.168.2.5111.41.150.25
                                    Jan 15, 2025 19:05:48.590704918 CET50089445192.168.2.5111.41.150.25
                                    Jan 15, 2025 19:05:48.590889931 CET50090445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:05:48.595788956 CET44550090111.41.150.1192.168.2.5
                                    Jan 15, 2025 19:05:48.595916033 CET50090445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:05:48.595957994 CET44550089111.41.150.25192.168.2.5
                                    Jan 15, 2025 19:05:48.595997095 CET50090445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:05:48.596023083 CET50089445192.168.2.5111.41.150.25
                                    Jan 15, 2025 19:05:48.596188068 CET50091445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:05:48.601038933 CET44550091111.41.150.1192.168.2.5
                                    Jan 15, 2025 19:05:48.601119995 CET50091445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:05:48.601169109 CET50091445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:05:48.601219893 CET44550090111.41.150.1192.168.2.5
                                    Jan 15, 2025 19:05:48.601283073 CET50090445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:05:48.605993032 CET44550091111.41.150.1192.168.2.5
                                    Jan 15, 2025 19:05:48.705997944 CET4455008431.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:48.706203938 CET50084445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:48.706260920 CET50084445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:48.706324100 CET50084445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:48.711040974 CET4455008431.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:48.711122990 CET4455008431.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:48.900202990 CET4455003428.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:48.900336027 CET50034445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:48.900402069 CET50034445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:48.900460005 CET50034445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:48.905472040 CET4455003428.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:48.905503988 CET4455003428.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:49.040702105 CET44550035134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:49.040975094 CET50035445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:49.040975094 CET50035445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:49.041022062 CET50035445192.168.2.5134.49.104.1
                                    Jan 15, 2025 19:05:49.046192884 CET44550035134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:49.046232939 CET44550035134.49.104.1192.168.2.5
                                    Jan 15, 2025 19:05:49.101099968 CET50092445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:05:49.106134892 CET44550092134.49.104.2192.168.2.5
                                    Jan 15, 2025 19:05:49.106240988 CET50092445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:05:49.106281042 CET50092445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:05:49.110059023 CET50093445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:05:49.111335993 CET44550092134.49.104.2192.168.2.5
                                    Jan 15, 2025 19:05:49.111424923 CET50092445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:05:49.114940882 CET44550093134.49.104.2192.168.2.5
                                    Jan 15, 2025 19:05:49.115012884 CET50093445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:05:49.115060091 CET50093445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:05:49.119854927 CET44550093134.49.104.2192.168.2.5
                                    Jan 15, 2025 19:05:49.601268053 CET50094445192.168.2.564.237.205.176
                                    Jan 15, 2025 19:05:49.606128931 CET4455009464.237.205.176192.168.2.5
                                    Jan 15, 2025 19:05:49.606239080 CET50094445192.168.2.564.237.205.176
                                    Jan 15, 2025 19:05:49.606287956 CET50094445192.168.2.564.237.205.176
                                    Jan 15, 2025 19:05:49.606549978 CET50095445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:05:49.611329079 CET4455009564.237.205.1192.168.2.5
                                    Jan 15, 2025 19:05:49.611399889 CET4455009464.237.205.176192.168.2.5
                                    Jan 15, 2025 19:05:49.611401081 CET50095445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:05:49.611442089 CET50095445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:05:49.611469030 CET50094445192.168.2.564.237.205.176
                                    Jan 15, 2025 19:05:49.611854076 CET50096445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:05:49.616307974 CET4455009564.237.205.1192.168.2.5
                                    Jan 15, 2025 19:05:49.616374969 CET50095445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:05:49.616765976 CET4455009664.237.205.1192.168.2.5
                                    Jan 15, 2025 19:05:49.616832972 CET50096445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:05:49.616863012 CET50096445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:05:49.621650934 CET4455009664.237.205.1192.168.2.5
                                    Jan 15, 2025 19:05:49.897831917 CET50097445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:49.902911901 CET445500971.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:49.903184891 CET50097445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:49.903184891 CET50097445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:05:49.908071995 CET445500971.54.112.1192.168.2.5
                                    Jan 15, 2025 19:05:50.539812088 CET50098445192.168.2.556.191.3.202
                                    Jan 15, 2025 19:05:50.544771910 CET4455009856.191.3.202192.168.2.5
                                    Jan 15, 2025 19:05:50.544895887 CET50098445192.168.2.556.191.3.202
                                    Jan 15, 2025 19:05:50.544945955 CET50098445192.168.2.556.191.3.202
                                    Jan 15, 2025 19:05:50.545053959 CET50099445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:05:50.550029039 CET4455009956.191.3.1192.168.2.5
                                    Jan 15, 2025 19:05:50.550070047 CET4455009856.191.3.202192.168.2.5
                                    Jan 15, 2025 19:05:50.550117970 CET50099445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:05:50.550156116 CET50098445192.168.2.556.191.3.202
                                    Jan 15, 2025 19:05:50.550252914 CET50099445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:05:50.550558090 CET50100445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:05:50.555303097 CET4455009956.191.3.1192.168.2.5
                                    Jan 15, 2025 19:05:50.555378914 CET4455010056.191.3.1192.168.2.5
                                    Jan 15, 2025 19:05:50.555399895 CET50099445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:05:50.555449009 CET50100445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:05:50.555476904 CET50100445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:05:50.560309887 CET4455010056.191.3.1192.168.2.5
                                    Jan 15, 2025 19:05:50.965904951 CET44550038114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:50.965991974 CET50038445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:50.966026068 CET50038445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:50.966075897 CET50038445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:50.970844030 CET44550038114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:50.970856905 CET44550038114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:51.044426918 CET4455003932.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:51.044565916 CET50039445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:51.044655085 CET50039445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:51.044744015 CET50039445192.168.2.532.155.22.1
                                    Jan 15, 2025 19:05:51.049541950 CET4455003932.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:51.049611092 CET4455003932.155.22.1192.168.2.5
                                    Jan 15, 2025 19:05:51.101535082 CET50101445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:05:51.106436968 CET4455010132.155.22.2192.168.2.5
                                    Jan 15, 2025 19:05:51.106587887 CET50101445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:05:51.106587887 CET50101445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:05:51.106965065 CET50102445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:05:51.111998081 CET4455010232.155.22.2192.168.2.5
                                    Jan 15, 2025 19:05:51.112097025 CET50102445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:05:51.112124920 CET50102445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:05:51.112183094 CET4455010132.155.22.2192.168.2.5
                                    Jan 15, 2025 19:05:51.112282991 CET50101445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:05:51.117012978 CET4455010232.155.22.2192.168.2.5
                                    Jan 15, 2025 19:05:51.429584026 CET50103445192.168.2.583.131.180.92
                                    Jan 15, 2025 19:05:51.434406996 CET4455010383.131.180.92192.168.2.5
                                    Jan 15, 2025 19:05:51.434494019 CET50103445192.168.2.583.131.180.92
                                    Jan 15, 2025 19:05:51.434568882 CET50103445192.168.2.583.131.180.92
                                    Jan 15, 2025 19:05:51.434814930 CET50104445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:05:51.439533949 CET4455010383.131.180.92192.168.2.5
                                    Jan 15, 2025 19:05:51.439599991 CET50103445192.168.2.583.131.180.92
                                    Jan 15, 2025 19:05:51.439618111 CET4455010483.131.180.1192.168.2.5
                                    Jan 15, 2025 19:05:51.439683914 CET50104445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:05:51.439703941 CET50104445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:05:51.439955950 CET50105445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:05:51.444593906 CET4455010483.131.180.1192.168.2.5
                                    Jan 15, 2025 19:05:51.444647074 CET50104445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:05:51.444793940 CET4455010583.131.180.1192.168.2.5
                                    Jan 15, 2025 19:05:51.444858074 CET50105445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:05:51.444911003 CET50105445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:05:51.449711084 CET4455010583.131.180.1192.168.2.5
                                    Jan 15, 2025 19:05:51.710304976 CET50106445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:51.715101957 CET4455010631.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:51.715198994 CET50106445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:51.715229034 CET50106445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:51.720889091 CET4455010631.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:51.913775921 CET50107445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:51.918613911 CET4455010728.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:51.918694973 CET50107445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:51.918728113 CET50107445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:05:51.923500061 CET4455010728.233.50.1192.168.2.5
                                    Jan 15, 2025 19:05:52.261656046 CET50108445192.168.2.570.179.99.57
                                    Jan 15, 2025 19:05:52.266526937 CET4455010870.179.99.57192.168.2.5
                                    Jan 15, 2025 19:05:52.266634941 CET50108445192.168.2.570.179.99.57
                                    Jan 15, 2025 19:05:52.266818047 CET50108445192.168.2.570.179.99.57
                                    Jan 15, 2025 19:05:52.267060041 CET50109445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:05:52.272981882 CET4455010970.179.99.1192.168.2.5
                                    Jan 15, 2025 19:05:52.273053885 CET50109445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:05:52.273081064 CET50109445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:05:52.273473024 CET50110445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:05:52.274393082 CET4455010870.179.99.57192.168.2.5
                                    Jan 15, 2025 19:05:52.278435946 CET4455011070.179.99.1192.168.2.5
                                    Jan 15, 2025 19:05:52.278543949 CET50110445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:05:52.280615091 CET4455010970.179.99.1192.168.2.5
                                    Jan 15, 2025 19:05:52.280666113 CET50110445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:05:52.283536911 CET4455010870.179.99.57192.168.2.5
                                    Jan 15, 2025 19:05:52.283596039 CET50108445192.168.2.570.179.99.57
                                    Jan 15, 2025 19:05:52.285494089 CET4455011070.179.99.1192.168.2.5
                                    Jan 15, 2025 19:05:52.286036968 CET4455010970.179.99.1192.168.2.5
                                    Jan 15, 2025 19:05:52.286086082 CET50109445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:05:52.933171988 CET4455004280.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:52.933300972 CET50042445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:52.933442116 CET50042445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:52.933500051 CET50042445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:52.938210011 CET4455004280.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:52.938334942 CET4455004280.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:53.023252010 CET50112445192.168.2.5195.117.220.11
                                    Jan 15, 2025 19:05:53.028310061 CET44550112195.117.220.11192.168.2.5
                                    Jan 15, 2025 19:05:53.028460026 CET50112445192.168.2.5195.117.220.11
                                    Jan 15, 2025 19:05:53.028500080 CET50112445192.168.2.5195.117.220.11
                                    Jan 15, 2025 19:05:53.028633118 CET50113445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:05:53.033480883 CET44550113195.117.220.1192.168.2.5
                                    Jan 15, 2025 19:05:53.033580065 CET50113445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:05:53.033655882 CET50113445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:05:53.033799887 CET44550112195.117.220.11192.168.2.5
                                    Jan 15, 2025 19:05:53.033973932 CET50112445192.168.2.5195.117.220.11
                                    Jan 15, 2025 19:05:53.034061909 CET50114445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:05:53.038944960 CET44550113195.117.220.1192.168.2.5
                                    Jan 15, 2025 19:05:53.039024115 CET50113445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:05:53.039077044 CET44550114195.117.220.1192.168.2.5
                                    Jan 15, 2025 19:05:53.039180994 CET50114445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:05:53.039242029 CET50114445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:05:53.044148922 CET44550114195.117.220.1192.168.2.5
                                    Jan 15, 2025 19:05:53.153335094 CET4455004377.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:53.153477907 CET50043445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:53.153558969 CET50043445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:53.153645992 CET50043445192.168.2.577.208.234.1
                                    Jan 15, 2025 19:05:53.158431053 CET4455004377.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:53.158474922 CET4455004377.208.234.1192.168.2.5
                                    Jan 15, 2025 19:05:53.210720062 CET50115445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:05:53.216350079 CET4455011577.208.234.2192.168.2.5
                                    Jan 15, 2025 19:05:53.216471910 CET50115445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:05:53.216511965 CET50115445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:05:53.217376947 CET50116445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:05:53.222482920 CET4455011677.208.234.2192.168.2.5
                                    Jan 15, 2025 19:05:53.222652912 CET50116445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:05:53.222702980 CET50116445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:05:53.224483013 CET4455011577.208.234.2192.168.2.5
                                    Jan 15, 2025 19:05:53.225814104 CET4455011577.208.234.2192.168.2.5
                                    Jan 15, 2025 19:05:53.225878954 CET50115445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:05:53.227535963 CET4455011677.208.234.2192.168.2.5
                                    Jan 15, 2025 19:05:53.324467897 CET4455010631.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:53.324562073 CET50106445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:53.324631929 CET50106445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:53.324675083 CET50106445192.168.2.531.57.181.2
                                    Jan 15, 2025 19:05:53.330907106 CET4455010631.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:53.331049919 CET4455010631.57.181.2192.168.2.5
                                    Jan 15, 2025 19:05:53.382519007 CET50117445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:53.387394905 CET4455011731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:53.387492895 CET50117445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:53.387530088 CET50117445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:53.388009071 CET50118445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:53.392476082 CET4455011731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:53.392605066 CET4455011731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:53.392657995 CET50117445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:53.393023014 CET4455011831.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:53.393095970 CET50118445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:53.393148899 CET50118445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:53.398044109 CET4455011831.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:53.976468086 CET50120445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:53.981380939 CET44550120114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:53.981471062 CET50120445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:53.981682062 CET50120445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:05:53.986494064 CET44550120114.103.109.1192.168.2.5
                                    Jan 15, 2025 19:05:54.623689890 CET44550044103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:54.623797894 CET50044445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:54.627336025 CET50044445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:54.627418041 CET50044445192.168.2.5103.134.218.2
                                    Jan 15, 2025 19:05:54.632340908 CET44550044103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:54.632370949 CET44550044103.134.218.2192.168.2.5
                                    Jan 15, 2025 19:05:54.726332903 CET50122445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:05:54.731230021 CET44550122103.134.218.3192.168.2.5
                                    Jan 15, 2025 19:05:54.731422901 CET50122445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:05:54.731422901 CET50122445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:05:54.731811047 CET50123445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:05:54.736661911 CET44550123103.134.218.3192.168.2.5
                                    Jan 15, 2025 19:05:54.736749887 CET50123445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:05:54.736780882 CET50123445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:05:54.740480900 CET44550122103.134.218.3192.168.2.5
                                    Jan 15, 2025 19:05:54.741657019 CET44550123103.134.218.3192.168.2.5
                                    Jan 15, 2025 19:05:54.752140045 CET44550122103.134.218.3192.168.2.5
                                    Jan 15, 2025 19:05:54.752202034 CET50122445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:05:55.000986099 CET4455011831.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:55.001126051 CET50118445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:55.001358986 CET50118445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:55.001410007 CET50118445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:55.006279945 CET4455011831.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:55.006309986 CET4455011831.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:55.008754015 CET44550047114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:55.009753942 CET50047445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:55.009891987 CET50047445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:55.009932995 CET50047445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:55.014796972 CET44550047114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:55.014827013 CET44550047114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:55.134238958 CET4455004848.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:55.134354115 CET50048445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:55.134455919 CET50048445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:55.134526014 CET50048445192.168.2.548.158.167.1
                                    Jan 15, 2025 19:05:55.140000105 CET4455004848.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:55.140678883 CET4455004848.158.167.1192.168.2.5
                                    Jan 15, 2025 19:05:55.194807053 CET50126445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:05:55.200341940 CET4455012648.158.167.2192.168.2.5
                                    Jan 15, 2025 19:05:55.200495005 CET50126445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:05:55.200537920 CET50126445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:05:55.200957060 CET50127445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:05:55.205806017 CET4455012648.158.167.2192.168.2.5
                                    Jan 15, 2025 19:05:55.205877066 CET50126445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:05:55.206232071 CET4455012748.158.167.2192.168.2.5
                                    Jan 15, 2025 19:05:55.206346989 CET50127445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:05:55.206346989 CET50127445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:05:55.211590052 CET4455012748.158.167.2192.168.2.5
                                    Jan 15, 2025 19:05:55.944762945 CET50130445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:56.078819990 CET4455013080.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:56.078923941 CET50130445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:56.078968048 CET50130445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:05:56.083955050 CET4455013080.165.219.1192.168.2.5
                                    Jan 15, 2025 19:05:57.055907011 CET44550051121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:57.055996895 CET50051445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:57.070070028 CET50051445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:57.070125103 CET50051445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:05:57.075347900 CET44550051121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:57.075370073 CET44550051121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:05:57.186741114 CET4455005255.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:57.186808109 CET50052445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:57.186849117 CET50052445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:57.186918020 CET50052445192.168.2.555.228.135.1
                                    Jan 15, 2025 19:05:57.192233086 CET4455005255.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:57.192253113 CET4455005255.228.135.1192.168.2.5
                                    Jan 15, 2025 19:05:57.242993116 CET50139445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:05:57.248296976 CET4455013955.228.135.2192.168.2.5
                                    Jan 15, 2025 19:05:57.248388052 CET50139445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:05:57.249833107 CET50139445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:05:57.250138044 CET50140445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:05:57.254949093 CET4455013955.228.135.2192.168.2.5
                                    Jan 15, 2025 19:05:57.255052090 CET50139445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:05:57.255140066 CET4455014055.228.135.2192.168.2.5
                                    Jan 15, 2025 19:05:57.255199909 CET50140445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:05:57.257061005 CET50140445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:05:57.261831045 CET4455014055.228.135.2192.168.2.5
                                    Jan 15, 2025 19:05:58.007180929 CET50147445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:58.012090921 CET4455014731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:58.012168884 CET50147445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:58.012197018 CET50147445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:58.016963959 CET4455014731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:58.022746086 CET50148445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:58.027884007 CET44550148114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:58.027972937 CET50148445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:58.027996063 CET50148445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:05:58.032996893 CET44550148114.33.204.1192.168.2.5
                                    Jan 15, 2025 19:05:59.149449110 CET44550056216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:59.149538994 CET50056445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:59.149574995 CET50056445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:59.149610996 CET50056445192.168.2.5216.45.203.1
                                    Jan 15, 2025 19:05:59.154531956 CET44550056216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:59.154541016 CET44550056216.45.203.1192.168.2.5
                                    Jan 15, 2025 19:05:59.210386038 CET50161445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:05:59.215265989 CET44550161216.45.203.2192.168.2.5
                                    Jan 15, 2025 19:05:59.215394020 CET50161445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:05:59.215439081 CET50161445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:05:59.215730906 CET50162445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:05:59.220396996 CET44550161216.45.203.2192.168.2.5
                                    Jan 15, 2025 19:05:59.220468044 CET50161445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:05:59.220472097 CET44550162216.45.203.2192.168.2.5
                                    Jan 15, 2025 19:05:59.220535994 CET50162445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:05:59.220572948 CET50162445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:05:59.225349903 CET44550162216.45.203.2192.168.2.5
                                    Jan 15, 2025 19:05:59.591392040 CET4455014731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:59.591496944 CET50147445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:59.591538906 CET50147445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:59.591578007 CET50147445192.168.2.531.57.181.3
                                    Jan 15, 2025 19:05:59.597390890 CET4455014731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:59.597402096 CET4455014731.57.181.3192.168.2.5
                                    Jan 15, 2025 19:05:59.648063898 CET50170445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:05:59.653373003 CET4455017031.57.181.4192.168.2.5
                                    Jan 15, 2025 19:05:59.653461933 CET50170445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:05:59.653498888 CET50170445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:05:59.653868914 CET50171445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:05:59.658478022 CET4455017031.57.181.4192.168.2.5
                                    Jan 15, 2025 19:05:59.658543110 CET50170445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:05:59.658741951 CET4455017131.57.181.4192.168.2.5
                                    Jan 15, 2025 19:05:59.658806086 CET50171445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:05:59.658849001 CET50171445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:05:59.663609982 CET4455017131.57.181.4192.168.2.5
                                    Jan 15, 2025 19:06:00.085272074 CET50175445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:06:00.290338039 CET44550175121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:06:00.290455103 CET50175445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:06:00.290543079 CET50175445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:06:00.295279980 CET44550175121.161.175.1192.168.2.5
                                    Jan 15, 2025 19:06:00.590718985 CET44550059188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:06:00.590866089 CET50059445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:06:00.590866089 CET50059445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:06:00.590969086 CET50059445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:06:00.597978115 CET44550059188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:06:00.598525047 CET44550059188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:06:01.229465961 CET4455017131.57.181.4192.168.2.5
                                    Jan 15, 2025 19:06:01.229639053 CET50171445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:06:01.229742050 CET50171445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:06:01.229779005 CET50171445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:06:01.234522104 CET4455017131.57.181.4192.168.2.5
                                    Jan 15, 2025 19:06:01.234534025 CET4455017131.57.181.4192.168.2.5
                                    Jan 15, 2025 19:06:01.260893106 CET4455006042.34.73.1192.168.2.5
                                    Jan 15, 2025 19:06:01.261217117 CET50060445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:06:01.261217117 CET50060445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:06:01.261218071 CET50060445192.168.2.542.34.73.1
                                    Jan 15, 2025 19:06:01.266242981 CET4455006042.34.73.1192.168.2.5
                                    Jan 15, 2025 19:06:01.266256094 CET4455006042.34.73.1192.168.2.5
                                    Jan 15, 2025 19:06:01.319787979 CET50200445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:01.324929953 CET4455020042.34.73.2192.168.2.5
                                    Jan 15, 2025 19:06:01.325037956 CET50200445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:01.325062990 CET50200445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:01.325438976 CET50201445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:01.330239058 CET4455020142.34.73.2192.168.2.5
                                    Jan 15, 2025 19:06:01.330312014 CET4455020042.34.73.2192.168.2.5
                                    Jan 15, 2025 19:06:01.330312967 CET50201445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:01.330342054 CET50201445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:01.330369949 CET50200445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:01.335139036 CET4455020142.34.73.2192.168.2.5
                                    Jan 15, 2025 19:06:03.231933117 CET44550064162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:06:03.234052896 CET50064445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:06:03.234052896 CET50064445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:06:03.234052896 CET50064445192.168.2.5162.221.124.1
                                    Jan 15, 2025 19:06:03.238904953 CET44550064162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:06:03.238918066 CET44550064162.221.124.1192.168.2.5
                                    Jan 15, 2025 19:06:03.288599014 CET50257445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:03.293384075 CET44550257162.221.124.2192.168.2.5
                                    Jan 15, 2025 19:06:03.293474913 CET50257445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:03.293556929 CET50257445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:03.293855906 CET50259445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:03.298480988 CET44550257162.221.124.2192.168.2.5
                                    Jan 15, 2025 19:06:03.298537970 CET50257445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:03.298652887 CET44550259162.221.124.2192.168.2.5
                                    Jan 15, 2025 19:06:03.298729897 CET50259445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:03.298763037 CET50259445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:03.303512096 CET44550259162.221.124.2192.168.2.5
                                    Jan 15, 2025 19:06:03.600960970 CET50273445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:06:03.605865002 CET44550273188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:06:03.605950117 CET50273445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:06:03.605986118 CET50273445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:06:03.611170053 CET44550273188.168.25.1192.168.2.5
                                    Jan 15, 2025 19:06:03.741832018 CET44550068114.75.42.1192.168.2.5
                                    Jan 15, 2025 19:06:03.742059946 CET50068445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:06:03.742088079 CET50068445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:06:03.742145061 CET50068445192.168.2.5114.75.42.1
                                    Jan 15, 2025 19:06:03.746942043 CET44550068114.75.42.1192.168.2.5
                                    Jan 15, 2025 19:06:03.746953011 CET44550068114.75.42.1192.168.2.5
                                    Jan 15, 2025 19:06:04.241595984 CET50319445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:06:04.246572971 CET4455031931.57.181.4192.168.2.5
                                    Jan 15, 2025 19:06:04.246680975 CET50319445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:06:04.246718884 CET50319445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:06:04.251576900 CET4455031931.57.181.4192.168.2.5
                                    Jan 15, 2025 19:06:05.165532112 CET44550071179.117.52.1192.168.2.5
                                    Jan 15, 2025 19:06:05.165616989 CET50071445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:06:05.247699976 CET44550072218.64.246.1192.168.2.5
                                    Jan 15, 2025 19:06:05.247792959 CET50072445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:06:05.464140892 CET44550074200.211.71.2192.168.2.5
                                    Jan 15, 2025 19:06:05.464232922 CET50074445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:06:05.764697075 CET50140445192.168.2.555.228.135.2
                                    Jan 15, 2025 19:06:05.764734983 CET50127445192.168.2.548.158.167.2
                                    Jan 15, 2025 19:06:05.764786005 CET50093445192.168.2.5134.49.104.2
                                    Jan 15, 2025 19:06:05.764828920 CET50116445192.168.2.577.208.234.2
                                    Jan 15, 2025 19:06:05.764870882 CET50120445192.168.2.5114.103.109.1
                                    Jan 15, 2025 19:06:05.764939070 CET50074445192.168.2.5200.211.71.2
                                    Jan 15, 2025 19:06:05.765002966 CET50102445192.168.2.532.155.22.2
                                    Jan 15, 2025 19:06:05.765042067 CET50259445192.168.2.5162.221.124.2
                                    Jan 15, 2025 19:06:05.765042067 CET50201445192.168.2.542.34.73.2
                                    Jan 15, 2025 19:06:05.765084028 CET50071445192.168.2.5179.117.52.1
                                    Jan 15, 2025 19:06:05.765117884 CET50072445192.168.2.5218.64.246.1
                                    Jan 15, 2025 19:06:05.765137911 CET50077445192.168.2.598.145.173.1
                                    Jan 15, 2025 19:06:05.765153885 CET50079445192.168.2.514.80.182.1
                                    Jan 15, 2025 19:06:05.765180111 CET50082445192.168.2.551.79.151.1
                                    Jan 15, 2025 19:06:05.765199900 CET50087445192.168.2.5105.127.28.1
                                    Jan 15, 2025 19:06:05.765254021 CET50088445192.168.2.566.120.42.1
                                    Jan 15, 2025 19:06:05.765254021 CET50091445192.168.2.5111.41.150.1
                                    Jan 15, 2025 19:06:05.765301943 CET50097445192.168.2.51.54.112.1
                                    Jan 15, 2025 19:06:05.765326023 CET50096445192.168.2.564.237.205.1
                                    Jan 15, 2025 19:06:05.765341043 CET50100445192.168.2.556.191.3.1
                                    Jan 15, 2025 19:06:05.765356064 CET50105445192.168.2.583.131.180.1
                                    Jan 15, 2025 19:06:05.765397072 CET50107445192.168.2.528.233.50.1
                                    Jan 15, 2025 19:06:05.765455961 CET50123445192.168.2.5103.134.218.3
                                    Jan 15, 2025 19:06:05.765486002 CET50130445192.168.2.580.165.219.1
                                    Jan 15, 2025 19:06:05.765515089 CET50175445192.168.2.5121.161.175.1
                                    Jan 15, 2025 19:06:05.765537024 CET50110445192.168.2.570.179.99.1
                                    Jan 15, 2025 19:06:05.765537024 CET50114445192.168.2.5195.117.220.1
                                    Jan 15, 2025 19:06:05.765537024 CET50148445192.168.2.5114.33.204.1
                                    Jan 15, 2025 19:06:05.765599012 CET50162445192.168.2.5216.45.203.2
                                    Jan 15, 2025 19:06:05.765640974 CET50273445192.168.2.5188.168.25.1
                                    Jan 15, 2025 19:06:05.766159058 CET50319445192.168.2.531.57.181.4
                                    Jan 15, 2025 19:07:05.805838108 CET5037980192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:07:05.810782909 CET8050379104.16.167.228192.168.2.5
                                    Jan 15, 2025 19:07:05.810918093 CET5037980192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:07:05.811151028 CET5037980192.168.2.5104.16.167.228
                                    Jan 15, 2025 19:07:05.815917015 CET8050379104.16.167.228192.168.2.5
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 19:04:59.994941950 CET5025553192.168.2.51.1.1.1
                                    Jan 15, 2025 19:05:00.003463984 CET53502551.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 15, 2025 19:04:59.994941950 CET192.168.2.51.1.1.10x98e8Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 15, 2025 19:05:00.003463984 CET1.1.1.1192.168.2.50x98e8No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                    Jan 15, 2025 19:05:00.003463984 CET1.1.1.1192.168.2.50x98e8No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                    • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549704104.16.167.228804296C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 19:05:00.015273094 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 19:05:00.510018110 CET778INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 18:05:00 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 9027ca9dbddd4332-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549705104.16.167.228801472C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 19:05:00.677023888 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 19:05:01.162854910 CET778INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 18:05:01 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 9027caa1b8f4425f-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.549724104.16.167.228806572C:\Windows\mssecsvc.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 19:05:02.785938025 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 19:05:03.302192926 CET778INHTTP/1.1 200 OK
                                    Date: Wed, 15 Jan 2025 18:05:03 GMT
                                    Content-Type: text/html
                                    Content-Length: 607
                                    Connection: close
                                    Server: cloudflare
                                    CF-RAY: 9027caaf0c1441bd-EWR
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                    Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    3192.168.2.550379104.16.167.22880
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 19:07:05.811151028 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                    Cache-Control: no-cache


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:13:04:58
                                    Start date:15/01/2025
                                    Path:C:\Windows\System32\loaddll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll"
                                    Imagebase:0x4c0000
                                    File size:126'464 bytes
                                    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:1
                                    Start time:13:04:58
                                    Start date:15/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:13:04:58
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1
                                    Imagebase:0x790000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:13:04:58
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\ImPgtzz6o4.dll,PlayGame
                                    Imagebase:0x290000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:13:04:58
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",#1
                                    Imagebase:0x290000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:13:04:59
                                    Start date:15/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:A7DEF9BF7875F39BF0AA1C76BBE3D4F6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2043608275.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2066445961.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2043732457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.2043732457.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:7
                                    Start time:13:04:59
                                    Start date:15/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:A7DEF9BF7875F39BF0AA1C76BBE3D4F6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2051736271.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2695471506.0000000001EC1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2695471506.0000000001EC1000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2695874221.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2695874221.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2051858668.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.2051858668.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:8
                                    Start time:13:05:01
                                    Start date:15/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:FCBC058EEAB7FD8C9B6FE129EEFF2C88
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2064004861.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 96%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:9
                                    Start time:13:05:01
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\ImPgtzz6o4.dll",PlayGame
                                    Imagebase:0x290000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:13:05:02
                                    Start date:15/01/2025
                                    Path:C:\Windows\mssecsvc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvc.exe
                                    Imagebase:0x400000
                                    File size:3'723'264 bytes
                                    MD5 hash:A7DEF9BF7875F39BF0AA1C76BBE3D4F6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2081398569.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2072388657.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2081543640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.2081543640.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2072523212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.2072523212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:11
                                    Start time:13:05:02
                                    Start date:15/01/2025
                                    Path:C:\Windows\tasksche.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\WINDOWS\tasksche.exe /i
                                    Imagebase:0x400000
                                    File size:3'514'368 bytes
                                    MD5 hash:FCBC058EEAB7FD8C9B6FE129EEFF2C88
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.2080438903.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.2080853616.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:71.8%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:64.9%
                                      Total number of Nodes:37
                                      Total number of Limit Nodes:9

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                      • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                      • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                      • CreateProcessA.KERNELBASE ref: 00407EE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                      • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2066405351.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000005.00000002.2066388585.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066429801.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066497387.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4281112323-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2066405351.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000005.00000002.2066388585.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066429801.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066497387.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2066405351.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000005.00000002.2066388585.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066429801.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066497387.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                      • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2066405351.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000005.00000002.2066388585.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066429801.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066497387.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2066405351.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000005.00000002.2066388585.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066429801.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066445961.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066497387.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000005.00000002.2066604552.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Execution Graph

                                      Execution Coverage:34.9%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:35
                                      Total number of Limit Nodes:2

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2694401014.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.2694383076.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694419802.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694497779.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694515158.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.0
                                      • API String ID: 4274534310-3729025388
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2694401014.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.2694383076.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694419802.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694497779.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694515158.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                      • API String ID: 774561529-2942426231
                                      • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                      • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                      • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2694401014.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.2694383076.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694419802.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694497779.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694515158.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                      • API String ID: 3340711343-4063779371
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2694401014.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.2694383076.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694419802.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694497779.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694515158.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4072214828-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.2694401014.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000007.00000002.2694383076.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694419802.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694437736.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694480148.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694497779.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694515158.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000007.00000002.2694595763.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                      APIs
                                      • memcpy.MSVCRT(000000FF,?,0000012C,?,00000000), ref: 00406C91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: /../$/..\$\../$\..\
                                      • API String ID: 3510742995-3885502717
                                      • Opcode ID: 00491be41aa5427f31b8b9a32a9b57da7e2e6dff5cb5143b376a5dd6570fe62a
                                      • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                      • Opcode Fuzzy Hash: 00491be41aa5427f31b8b9a32a9b57da7e2e6dff5cb5143b376a5dd6570fe62a
                                      • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                      APIs
                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                      • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                      • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                      • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                      • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                      • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                      • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                      • API String ID: 2238633743-2459060434
                                      • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                      • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                      • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                      APIs
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                      • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                      • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$ManagerStart
                                      • String ID: cmd.exe /c "%s"
                                      • API String ID: 1485051382-955883872
                                      • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                      • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                      • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                      • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                      • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                      • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow$memcpy
                                      • String ID:
                                      • API String ID: 1881450474-3916222277
                                      • Opcode ID: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                      • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                      • Opcode Fuzzy Hash: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                      • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                      • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                      • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                      • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                      • String ID: 2!@$WANACRY!
                                      • API String ID: 283026544-2846199637
                                      • Opcode ID: 132a2296b2ff258622cfdc5610791c464188c2d7d3f69318739cc377377d902c
                                      • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                      • Opcode Fuzzy Hash: 132a2296b2ff258622cfdc5610791c464188c2d7d3f69318739cc377377d902c
                                      • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                      • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                      • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                      • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                      • String ID: 2!@$WANACRY!
                                      • API String ID: 283026544-2846199637
                                      • Opcode ID: d9b1b6046084e2d9d8768fc4d8ac5865fa55d0fd0db9d64480dfd0594076ccd5
                                      • Instruction ID: 4f5db7b03fbae4bd1a74ba09c9783dfc14942441ffc150fb06ee42d3f2d97cbc
                                      • Opcode Fuzzy Hash: d9b1b6046084e2d9d8768fc4d8ac5865fa55d0fd0db9d64480dfd0594076ccd5
                                      • Instruction Fuzzy Hash: EF511C71901219AFDB219F95CD88BEEB7BCEB08380F1444BAF515F61A0D7399A45CF28
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID: $Q;@
                                      • API String ID: 2382887404-262343263
                                      • Opcode ID: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                      • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                      • Opcode Fuzzy Hash: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                      • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-3916222277
                                      • Opcode ID: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                      • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                      • Opcode Fuzzy Hash: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                      • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                      APIs
                                      • free.MSVCRT(?,?,00000000,00000000,0040243C,00000000), ref: 00402A15
                                      • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                      • HeapFree.KERNEL32(00000000), ref: 00402A3D
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$FreeProcessfree
                                      • String ID:
                                      • API String ID: 3428986607-0
                                      • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                      • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                      • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                      • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                      • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrow
                                      • String ID:
                                      • API String ID: 941485209-0
                                      • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                      • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                      • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: 71b96a770fe0ecad1357f1a23098f25de26b1f41743f28900a51c64cf9a44166
                                      • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                      • Opcode Fuzzy Hash: 71b96a770fe0ecad1357f1a23098f25de26b1f41743f28900a51c64cf9a44166
                                      • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                      APIs
                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ContextCryptRelease
                                      • String ID:
                                      • API String ID: 829835001-0
                                      • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                      • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                      • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                      • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                      • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                      • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                      • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                      APIs
                                        • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                        • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                      • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                      • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                      • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                      • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                      • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                      • API String ID: 2238633743-1294736154
                                      • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                      • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                      • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000208), ref: 0040201F
                                        • Part of subcall function 00401225: GetComputerNameW.KERNEL32(?,0000018F), ref: 0040125F
                                        • Part of subcall function 00401225: wcslen.MSVCRT(?), ref: 00401279
                                        • Part of subcall function 00401225: wcslen.MSVCRT(?), ref: 00401298
                                        • Part of subcall function 00401225: srand.MSVCRT(00000001), ref: 004012A1
                                        • Part of subcall function 00401225: rand.MSVCRT ref: 004012AE
                                        • Part of subcall function 00401225: rand.MSVCRT ref: 004012C0
                                        • Part of subcall function 00401225: rand.MSVCRT ref: 004012DD
                                      • __p___argc.MSVCRT ref: 00402030
                                      • __p___argv.MSVCRT(0040F538), ref: 00402040
                                      • strcmp.MSVCRT(?), ref: 0040204B
                                        • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                        • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                        • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                        • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      • CopyFileA.KERNEL32(?,tasksche.exe,00000000), ref: 0040206F
                                      • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                        • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                      • strrchr.MSVCRT(?,0000005C), ref: 0040209D
                                      • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                      • SetCurrentDirectoryA.KERNEL32(?), ref: 004020BB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Namerand$AttributesDirectorystrrchrwcslen$ByteCharComputerCopyCurrentFullModuleMultiPathWideWindows__p___argc__p___argvsrandstrcmpswprintf
                                      • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                      • API String ID: 1102508541-2844324180
                                      • Opcode ID: fa07170e1e4a4f1b7f83228e29d312703e7eca5b79990a058ae1880847bcfca1
                                      • Instruction ID: 97633fc0405850e3ba211803acf8e340ff081048f6dba40907e2b9e4b27fb4f3
                                      • Opcode Fuzzy Hash: fa07170e1e4a4f1b7f83228e29d312703e7eca5b79990a058ae1880847bcfca1
                                      • Instruction Fuzzy Hash: 3741B472500359AEDB20A7B1DE49E9F376C9F10314F2005BFF645F61E2DE788D488A28
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: %s%s$%s%s%s$:$\
                                      • API String ID: 0-1100577047
                                      • Opcode ID: 4cc63effac65e5938d24d15cc637f4576a4bae754db62ced997f6066a9556017
                                      • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                      • Opcode Fuzzy Hash: 4cc63effac65e5938d24d15cc637f4576a4bae754db62ced997f6066a9556017
                                      • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                      APIs
                                      • wcscat.MSVCRT(?,WanaCrypt0r), ref: 0040114B
                                      • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                      • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                      • strlen.MSVCRT(?), ref: 004011A7
                                      • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                      • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                      • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                      • String ID: 0@$Software\$WanaCrypt0r
                                      • API String ID: 865909632-3421300005
                                      • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                      • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                      • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                      • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                      • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                      • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                      • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                        • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                        • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                      • String ID: %s\Intel$%s\ProgramData
                                      • API String ID: 3806094219-198707228
                                      • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                      • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                      • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                      APIs
                                      • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                      • __p__fmode.MSVCRT ref: 004077FC
                                      • __p__commode.MSVCRT ref: 0040780A
                                      • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                      • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                      • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                      • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                      • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                      • exit.MSVCRT(00000000), ref: 004078F2
                                      • _XcptFilter.MSVCRT(?,?), ref: 00407904
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                      • Instruction ID: b6807de3fe1c3e28ab0f2b8c021909998ac3013dced3884fb388c7f537fcd598
                                      • Opcode Fuzzy Hash: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                      • Instruction Fuzzy Hash: A34173B1C04344AFDB20AFA4DE49AA97BB8BF05310F20417FE581B72E1D7786845CB59
                                      APIs
                                        • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?,00000040,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402463
                                      • SetLastError.KERNEL32(000000C1,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402219
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402291
                                      • GetProcessHeap.KERNEL32(00000008,0000003C), ref: 00402313
                                      • HeapAlloc.KERNEL32(00000000), ref: 0040231A
                                      • memcpy.MSVCRT(00000000,?,?), ref: 004023A7
                                        • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?,?,00000000,00000000,?), ref: 004024D5
                                      • SetLastError.KERNEL32(0000045A), ref: 00402430
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                      • API String ID: 1900561814-192647395
                                      • Opcode ID: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                      • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                      • Opcode Fuzzy Hash: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                      • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                      APIs
                                      • FindResourceA.KERNEL32(?,0000080A,XIA), ref: 00401DC3
                                      • LoadResource.KERNEL32(?,00000000), ref: 00401DD3
                                      • LockResource.KERNEL32(00000000), ref: 00401DDE
                                      • SizeofResource.KERNEL32(?,00000000,?), ref: 00401DF1
                                      • strcmp.MSVCRT(?,c.wnry,00000000,00000000,00000000), ref: 00401E5B
                                      • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Resource$AttributesFileFindLoadLockSizeofstrcmp
                                      • String ID: XIA$c.wnry
                                      • API String ID: 1616299030-2505933848
                                      • Opcode ID: fa50258f105623fefeb72ee45be684de9f148c77f4537fdf01ad18e8f360a7dc
                                      • Instruction ID: c6e87d2598776ad3e20a4276f2cf7508875c12884426eb96d7428c940f8e6225
                                      • Opcode Fuzzy Hash: fa50258f105623fefeb72ee45be684de9f148c77f4537fdf01ad18e8f360a7dc
                                      • Instruction Fuzzy Hash: 93210332D001147ADB216631DC45FEF3A6C9F45360F1001B6FE48F21D1DB38DA998AE9
                                      APIs
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                      • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                      • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                      • String ID: %s\%s
                                      • API String ID: 1036847564-4073750446
                                      • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                      • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                      • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                      APIs
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                      • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                      • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                      • CloseHandle.KERNEL32(?), ref: 004010EC
                                      • CloseHandle.KERNEL32(?), ref: 004010F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                      • String ID: D
                                      • API String ID: 786732093-2746444292
                                      • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                      • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                      • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: rand$wcslen$ComputerNamesrand
                                      • String ID:
                                      • API String ID: 3058258771-0
                                      • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                      • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                      • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                      APIs
                                      • GetFileAttributesA.KERNEL32(00000000,00000000,00000000), ref: 00407083
                                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00407091
                                      • memcpy.MSVCRT(?,004073A3,004073A3,?,00000000,00000000), ref: 004070CA
                                      • strcpy.MSVCRT(00000000,00000000,00000000,00000000), ref: 004070FB
                                      • strcat.MSVCRT(00000000,004073A3,00000000,00000000), ref: 0040710A
                                      • GetFileAttributesA.KERNEL32(00000000,00000000,00000000), ref: 00407118
                                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                      • String ID:
                                      • API String ID: 2935503933-0
                                      • Opcode ID: c1a765a30f049a6e983e84c7fcdc04c319bd997b8f8109f685edbec73173bf57
                                      • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                      • Opcode Fuzzy Hash: c1a765a30f049a6e983e84c7fcdc04c319bd997b8f8109f685edbec73173bf57
                                      • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                      APIs
                                      • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                      • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                      • Sleep.KERNEL32(000003E8), ref: 00401F40
                                      • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleMutexOpenSleepsprintf
                                      • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                      • API String ID: 2780352083-2959021817
                                      • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                      • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                      • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                      APIs
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                      • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                      • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??0exception@@ExceptionThrowmemcpy
                                      • String ID:
                                      • API String ID: 2382887404-0
                                      • Opcode ID: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                      • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                      • Opcode Fuzzy Hash: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                      • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                      APIs
                                      • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                      • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                      • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                      • fclose.MSVCRT(00000000), ref: 00401058
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefopenfreadfwrite
                                      • String ID: c.wnry
                                      • API String ID: 4000964834-3240288721
                                      • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                      • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                      • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                      APIs
                                      • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?,004023F5,00000000), ref: 00402812
                                      • realloc.MSVCRT(85000001,317459C0,00000000), ref: 00402854
                                      • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Read$realloc
                                      • String ID:
                                      • API String ID: 1241503663-0
                                      • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                      • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                      • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040193A
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040194A
                                      • GlobalAlloc.KERNEL32(00000000,00000000), ref: 00401964
                                      • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000), ref: 0040197D
                                      • _local_unwind2.MSVCRT(?,000000FF), ref: 004019A6
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                      • String ID:
                                      • API String ID: 2811923685-0
                                      • Opcode ID: 3fa06aadd2471a705e8128430a745042bdb722af5d61b5b79dd264e81bcff4b6
                                      • Instruction ID: 6e643f249040116b9fc09fba66d69f614d66e1f70caffd77d95453aa30823522
                                      • Opcode Fuzzy Hash: 3fa06aadd2471a705e8128430a745042bdb722af5d61b5b79dd264e81bcff4b6
                                      • Instruction Fuzzy Hash: B1216DB1905224AFCB219BA59D48BDF7E78EB097A0F14422BF415B22E0D7384845C7AC
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,00000140,?,00406C12,?,00000000,00000001), ref: 00405BFE
                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?), ref: 00405C29
                                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?,?,?), ref: 00405C38
                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA), ref: 00405C8A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Pointer$??2@Create
                                      • String ID:
                                      • API String ID: 1331958074-0
                                      • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                      • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                      • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                      APIs
                                      • GetCurrentDirectoryA.KERNEL32(00000104,00000140,00000000,00000000,00000000,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003), ref: 00406BB5
                                      • strlen.MSVCRT(00000140,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 00406BBC
                                      • strcat.MSVCRT(00000140,0040F818,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000), ref: 00406BD7
                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00406BEE
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CurrentDirectoryFilePointerstrcatstrlen
                                      • String ID:
                                      • API String ID: 1952800545-0
                                      • Opcode ID: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                      • Instruction ID: 093f70e5e45cef0a0e83344fd40667ee43cd8b667dee5f3d4d1a5a93074d9648
                                      • Opcode Fuzzy Hash: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                      • Instruction Fuzzy Hash: 06112372004218AAFB305B28DD01BAB3368EB21720F21013FF592B91D0E778A9A2975D
                                      APIs
                                      • __EH_prolog.LIBCMT ref: 004074A9
                                      • ??2@YAPAXI@Z.MSVCRT(00000244,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074B5
                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074FF
                                        • Part of subcall function 00407527: strlen.MSVCRT(00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 0040754F
                                        • Part of subcall function 00407527: ??2@YAPAXI@Z.MSVCRT(00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 00407556
                                        • Part of subcall function 00407527: strcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00407563
                                      • ??2@YAPAXI@Z.MSVCRT(00000008,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 0040750B
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??2@$??3@H_prologstrcpystrlen
                                      • String ID:
                                      • API String ID: 1367312548-0
                                      • Opcode ID: a4ccc6bdab315bb6810547fd1e784a1e5bd6969783f5aead57b9b326a8da6d2d
                                      • Instruction ID: 24e2e141a7415e54cfde60e06bc6f84240982ef19f6b767edb42695c1fbc6ce5
                                      • Opcode Fuzzy Hash: a4ccc6bdab315bb6810547fd1e784a1e5bd6969783f5aead57b9b326a8da6d2d
                                      • Instruction Fuzzy Hash: C101D431D09111BBDB166F659C02B9E3EA0AF04764F10853FF806B76D1DB78AD00C69E
                                      APIs
                                      • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000), ref: 00405CB6
                                      • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000), ref: 00405CBD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??3@CloseHandle
                                      • String ID: $l@
                                      • API String ID: 3816424416-2140230165
                                      • Opcode ID: 695026124e8f63dae5928df1cfc53220c2aa5689ade8ebf819959d8fbb63d2b2
                                      • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                      • Opcode Fuzzy Hash: 695026124e8f63dae5928df1cfc53220c2aa5689ade8ebf819959d8fbb63d2b2
                                      • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                      • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                      • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2064726204.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2064701672.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064750664.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064771286.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2064799538.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CriticalSection$Leave$Entermemcpy
                                      • String ID:
                                      • API String ID: 3435569088-0
                                      • Opcode ID: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                      • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                      • Opcode Fuzzy Hash: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                      • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65