Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_26.exe

Overview

General Information

Sample name:LisectAVT_2403002A_26.exe
Analysis ID:1481028
MD5:eb4f4c455604f0f1ce111fbefecd9e21
SHA1:0a31ea9a024ecf6536283e1eda1f48458b10cbed
SHA256:3f48a8d80cc55a1fbe9a210b60b07f3677b736b8a02d5408697d9df54a276776
Tags:exeWannaCry
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Connects to several IPs in different countries
Contains capabilities to detect virtual machines
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • svchost.exe (PID: 7472 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 7512 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 7552 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7560 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • LisectAVT_2403002A_26.exe (PID: 7600 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_26.exe" MD5: EB4F4C455604F0F1CE111FBEFECD9E21)
    • tasksche.exe (PID: 8068 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 3DF2667EF94776EEB272A1404801F118)
  • svchost.exe (PID: 7724 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 4296 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7760 cmdline: C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • LisectAVT_2403002A_26.exe (PID: 7980 cmdline: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe -m security MD5: EB4F4C455604F0F1CE111FBEFECD9E21)
  • svchost.exe (PID: 8100 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
LisectAVT_2403002A_26.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    LisectAVT_2403002A_26.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x3136c:$x3: tasksche.exe
    • 0x4157c:$x3: tasksche.exe
    • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x415d0:$x5: WNcry@2ol7
    • 0x313d7:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0xe048:$x7: mssecsvc.exe
    • 0x17350:$x7: mssecsvc.exe
    • 0x31344:$x8: C:\%s\qeriuwjhrf
    • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0xe034:$s1: C:\%s\%s
    • 0x17338:$s1: C:\%s\%s
    • 0x31358:$s1: C:\%s\%s
    • 0x414d0:$s3: cmd.exe /c "%s"
    • 0x73a24:$s4: msg/m_portuguese.wnry
    • 0x2e68c:$s5: \\192.168.56.20\IPC$
    • 0x1ba81:$s6: \\172.16.99.5\IPC$
    • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
    LisectAVT_2403002A_26.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
    • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
    • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
    • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
    • 0x1d439:$s1: __TREEID__PLACEHOLDER__
    • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
    • 0x1f508:$s1: __TREEID__PLACEHOLDER__
    • 0x20570:$s1: __TREEID__PLACEHOLDER__
    • 0x215d8:$s1: __TREEID__PLACEHOLDER__
    • 0x22640:$s1: __TREEID__PLACEHOLDER__
    • 0x236a8:$s1: __TREEID__PLACEHOLDER__
    • 0x24710:$s1: __TREEID__PLACEHOLDER__
    • 0x25778:$s1: __TREEID__PLACEHOLDER__
    • 0x267e0:$s1: __TREEID__PLACEHOLDER__
    • 0x27848:$s1: __TREEID__PLACEHOLDER__
    • 0x288b0:$s1: __TREEID__PLACEHOLDER__
    • 0x29918:$s1: __TREEID__PLACEHOLDER__
    • 0x2a980:$s1: __TREEID__PLACEHOLDER__
    • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
    • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
    • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
    • 0x2e340:$s1: __TREEID__PLACEHOLDER__
    LisectAVT_2403002A_26.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    LisectAVT_2403002A_26.exeWin32_Ransomware_WannaCryunknownReversingLabs
    • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
    • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
    • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
    • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000000.1300769671.000000000040E000.00000008.00000001.01000000.00000006.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000004.00000000.1276459985.000000000040F000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000009.00000002.1936681471.0000000002286000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000009.00000002.1936681471.0000000002286000.00000004.00000020.00020000.00000000.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0x32e44:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0x32e6c:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            9.2.LisectAVT_2403002A_26.exe.22778c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            9.2.LisectAVT_2403002A_26.exe.1d4e084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 101 entries

              System Summary

              barindex
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, ProcessId: 7472, ProcessName: svchost.exe
              No Snort rule has matched
              Timestamp:2024-07-25T03:05:03.248798+0200
              SID:2031515
              Source Port:80
              Destination Port:49705
              Protocol:TCP
              Classtype:Misc activity
              Timestamp:2024-07-25T03:05:59.261810+0200
              SID:2022930
              Source Port:443
              Destination Port:50118
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T03:05:21.160650+0200
              SID:2022930
              Source Port:443
              Destination Port:49896
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T03:05:03.247481+0200
              SID:2024302
              Source Port:49705
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T03:05:02.317541+0200
              SID:2024302
              Source Port:49704
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T03:05:01.754726+0200
              SID:2024291
              Source Port:64236
              Destination Port:53
              Protocol:UDP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-25T03:05:02.319513+0200
              SID:2031515
              Source Port:80
              Destination Port:49704
              Protocol:TCP
              Classtype:Misc activity

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: LisectAVT_2403002A_26.exeAvira: detected
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Avira URL Cloud: Label: phishing
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/zAvira URL Cloud: Label: phishing
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/uAvira URL Cloud: Label: phishing
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comAvira URL Cloud: Label: phishing
              Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/TAvira URL Cloud: Label: phishing
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comVirustotal: Detection: 8%Perma Link
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
              Source: LisectAVT_2403002A_26.exeReversingLabs: Detection: 100%
              Source: LisectAVT_2403002A_26.exeVirustotal: Detection: 89%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: LisectAVT_2403002A_26.exeJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 10_2_004018B9 CryptReleaseContext,10_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: LisectAVT_2403002A_26.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:49896 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:50118 version: TLS 1.2

              Networking

              barindex
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 25 Jul 2024 01:05:02 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 8a883d44ba7f7d1c-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 25 Jul 2024 01:05:03 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 8a883d4adb6a43b1-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: unknownNetwork traffic detected: IP country count 10
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.105
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.105
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.105
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.105
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 63.131.224.1
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.136
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.136
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.136
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.1
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.1
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.1
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.136
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.1
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.1
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.1
              Source: unknownTCP traffic detected without corresponding DNS query: 158.15.154.1
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.101
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.101
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.101
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.101
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 48.239.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 87.253.190.16
              Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=l+uax9tLW5uZ1WT&MD=MVy5HlLL HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
              Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=l+uax9tLW5uZ1WT&MD=MVy5HlLL HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: svchost.exe, 00000008.00000002.2521584302.000001E2F3685000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2521987156.000001E2F3F20000.00000004.00000020.00020000.00000000.sdmp, regid.1991-06.com.microsoft_Windows-10-Pro.swidtag.8.drString found in binary or memory: http://standards.iso.org/iso/19770/-2/2009/schema.xsd
              Source: svchost.exe, 00000000.00000002.1372005571.000001C7B0013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
              Source: LisectAVT_2403002A_26.exeString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: LisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B7E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000003.1300347634.0000000000AB5000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000002.1935753998.0000000000A78000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000002.1935753998.0000000000A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: LisectAVT_2403002A_26.exe, 00000009.00000003.1300347634.0000000000AB5000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000002.1935753998.0000000000A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/T
              Source: LisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/u
              Source: LisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/z
              Source: LisectAVT_2403002A_26.exe, 00000009.00000002.1935072040.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: LisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comT
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
              Source: svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371642803.000001C7B005A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371457057.000001C7B006E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372150683.000001C7B0070000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
              Source: svchost.exe, 00000000.00000003.1371457057.000001C7B006E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372150683.000001C7B0070000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
              Source: svchost.exe, 00000000.00000002.1372138499.000001C7B0068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371520605.000001C7B0067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
              Source: svchost.exe, 00000000.00000002.1372163560.000001C7B0077000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371310107.000001C7B0075000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
              Source: svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371642803.000001C7B005A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
              Source: svchost.exe, 00000000.00000002.1372138499.000001C7B0068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372023471.000001C7B002B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371520605.000001C7B0067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
              Source: svchost.exe, 00000000.00000002.1372055102.000001C7B003F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
              Source: svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
              Source: svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
              Source: svchost.exe, 00000000.00000003.1371700354.000001C7B0030000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
              Source: svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
              Source: svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
              Source: svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
              Source: svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
              Source: svchost.exe, 00000000.00000003.1371291501.000001C7B0034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
              Source: svchost.exe, 00000000.00000002.1372138499.000001C7B0068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372023471.000001C7B002B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371520605.000001C7B0067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
              Source: svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
              Source: svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
              Source: svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
              Source: svchost.exe, 00000000.00000002.1372023471.000001C7B002B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
              Source: svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49896
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50118
              Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:49896 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:50118 version: TLS 1.2

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!10_2_004014A6
              Source: Yara matchFile source: LisectAVT_2403002A_26.exe, type: SAMPLE
              Source: Yara matchFile source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.22778c8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.22828e8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.LisectAVT_2403002A_26.exe.1d590a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.1276459985.000000000040F000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1936681471.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1935230575.000000000042E000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1291190176.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.1276607451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1291005843.000000000040F000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1936364904.0000000001D5D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_26.exe PID: 7600, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_26.exe PID: 7980, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.22778c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.LisectAVT_2403002A_26.exe.1d590a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.LisectAVT_2403002A_26.exe.1d590a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.1300769671.000000000040E000.00000008.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1936681471.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1291190176.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000004.00000000.1276607451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1936364904.0000000001D5D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 10_2_00406C4010_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 10_2_00402A7610_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 10_2_00402E7E10_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040350F10_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 10_2_00404C1910_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040541F10_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 10_2_0040379710_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 10_2_004043B710_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 10_2_004031BC10_2_004031BC
              Source: LisectAVT_2403002A_26.exeStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: tasksche.exe.4.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: LisectAVT_2403002A_26.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: LisectAVT_2403002A_26.exe, type: SAMPLEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.22778c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.1d80128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.0.LisectAVT_2403002A_26.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.1d4e084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 4.0.LisectAVT_2403002A_26.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.1d5d104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.LisectAVT_2403002A_26.exe.1d590a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.LisectAVT_2403002A_26.exe.1d590a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.1300769671.000000000040E000.00000008.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1936681471.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1291190176.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000004.00000000.1276607451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1936364904.0000000001D5D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 0000000A.00000000.1300769671.000000000040E000.00000008.00000001.01000000.00000006.sdmp, LisectAVT_2403002A_26.exe, tasksche.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winEXE@14/3@1/100
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,4_2_00407C40
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,10_2_00401CE8
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeCode function: 4_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,FindCloseChangeNotification,CreateProcessA,CloseHandle,CloseHandle,4_2_00407CE0
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeCode function: 4_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,4_2_00407C40
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeCode function: 4_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,4_2_00408090
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeCode function: 9_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,9_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:664:120:WilError_03
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeFile created: C:\Windows\SERVIC~1\LOCALS~1\AppData\Local\Temp\MpCmdRun.logJump to behavior
              Source: LisectAVT_2403002A_26.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: LisectAVT_2403002A_26.exeReversingLabs: Detection: 100%
              Source: LisectAVT_2403002A_26.exeVirustotal: Detection: 89%
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeJump to behavior
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
              Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
              Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe "C:\Users\user\Desktop\LisectAVT_2403002A_26.exe"
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
              Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe C:\Users\user\Desktop\LisectAVT_2403002A_26.exe -m security
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: LisectAVT_2403002A_26.exeStatic file information: File size 3723271 > 1048576
              Source: LisectAVT_2403002A_26.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x35b000
              Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 10_2_00407710 push eax; ret 10_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 10_2_004076C8 push eax; ret 10_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeCode function: 4_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,4_2_00407C40
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe TID: 8052Thread sleep count: 92 > 30Jump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe TID: 8052Thread sleep time: -184000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe TID: 8056Thread sleep count: 125 > 30Jump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe TID: 8056Thread sleep count: 53 > 30Jump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exe TID: 8052Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeThread delayed: delay time: 86400000Jump to behavior
              Source: svchost.exe, 00000003.00000002.2521664055.000002174E460000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
              Source: svchost.exe, 00000003.00000002.2521568449.000002174E42B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: svchost.exe, 00000003.00000002.2521518661.000002174E413000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
              Source: LisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
              Source: LisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B9B000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000002.1935753998.0000000000A78000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000002.1935753998.0000000000AC9000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000003.1300347634.0000000000AC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: svchost.exe, 00000003.00000002.2521432329.000002174E402000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
              Source: LisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWg
              Source: svchost.exe, 00000003.00000002.2522028487.000002174E502000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
              Source: svchost.exe, 00000003.00000002.2521861297.000002174E466000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
              Source: svchost.exe, 00000003.00000002.2521664055.000002174E460000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
              Source: C:\Windows\tasksche.exeCode function: 10_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 10_2_004029CC free,GetProcessHeap,HeapFree,10_2_004029CC
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LisectAVT_2403002A_26.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46} STATEJump to behavior
              Source: svchost.exe, 00000007.00000002.2522266619.000001CF9E502000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
              Source: svchost.exe, 00000007.00000002.2522266619.000001CF9E502000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              21
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts2
              Service Execution
              1
              DLL Side-Loading
              1
              Process Injection
              1
              Disable or Modify Tools
              LSASS Memory251
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Native API
              Logon Script (Windows)1
              DLL Side-Loading
              141
              Virtualization/Sandbox Evasion
              Security Account Manager141
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Process Injection
              NTDS23
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481028 Sample: LisectAVT_2403002A_26.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 28 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->28 36 Tries to download HTTP data from a sinkholed server 2->36 38 Multi AV Scanner detection for domain / URL 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 6 other signatures 2->42 8 LisectAVT_2403002A_26.exe 7 2->8         started        12 LisectAVT_2403002A_26.exe 2->12         started        15 svchost.exe 2->15         started        17 6 other processes 2->17 signatures3 process4 dnsIp5 26 C:\Windows\tasksche.exe, PE32 8->26 dropped 52 Drops executables to the windows directory (C:\Windows) and starts them 8->52 19 tasksche.exe 8->19         started        30 192.168.2.102 unknown unknown 12->30 32 192.168.2.103 unknown unknown 12->32 34 98 other IPs or domains 12->34 54 Connects to many different private IPs via SMB (likely to spread or exploit) 12->54 56 Connects to many different private IPs (likely to spread or exploit) 12->56 58 Changes security center settings (notifications, updates, antivirus, firewall) 15->58 22 MpCmdRun.exe 2 15->22         started        60 Query firmware table information (likely to detect VMs) 17->60 file6 signatures7 process8 signatures9 44 Detected Wannacry Ransomware 19->44 46 Antivirus detection for dropped file 19->46 48 Multi AV Scanner detection for dropped file 19->48 50 Machine Learning detection for dropped file 19->50 24 conhost.exe 22->24         started        process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              LisectAVT_2403002A_26.exe100%ReversingLabsWin32.Ransomware.WannaCry
              LisectAVT_2403002A_26.exe89%VirustotalBrowse
              LisectAVT_2403002A_26.exe100%AviraTR/Ransom.Gen
              LisectAVT_2403002A_26.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\Windows\tasksche.exe97%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              SourceDetectionScannerLabelLink
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://dev.ditu.live.com/REST/v1/Routes/0%Avira URL Cloudsafe
              https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx0%Avira URL Cloudsafe
              https://dev.virtualearth.net/REST/v1/Routes/Driving0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/100%Avira URL Cloudphishing
              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx0%Avira URL Cloudsafe
              https://dev.virtualearth.net/REST/v1/Routes/0%Avira URL Cloudsafe
              https://dev.ditu.live.com/REST/v1/Transit/Stops/0%Avira URL Cloudsafe
              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=0%Avira URL Cloudsafe
              https://dev.virtualearth.net/REST/v1/Routes/Walking0%Avira URL Cloudsafe
              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=0%Avira URL Cloudsafe
              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?0%Avira URL Cloudsafe
              https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=0%Avira URL Cloudsafe
              https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/z100%Avira URL Cloudphishing
              https://dev.virtualearth.net/REST/v1/Locations0%Avira URL Cloudsafe
              https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/0%Avira URL Cloudsafe
              https://dev.virtualearth.net/mapcontrol/logging.ashx0%Avira URL Cloudsafe
              http://standards.iso.org/iso/19770/-2/2009/schema.xsd0%Avira URL Cloudsafe
              https://dev.ditu.live.com/mapcontrol/logging.ashx0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/u100%Avira URL Cloudphishing
              https://dev.ditu.live.com/REST/v1/Imagery/Copyright/0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com100%Avira URL Cloudphishing
              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=0%Avira URL Cloudsafe
              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=0%Avira URL Cloudsafe
              https://dynamic.t0%Avira URL Cloudsafe
              https://dev.virtualearth.net/REST/v1/Transit/Schedules/0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comT0%Avira URL Cloudsafe
              https://dev.virtualearth.net/REST/v1/Routes/Transit0%Avira URL Cloudsafe
              https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen0%Avira URL Cloudsafe
              https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=0%Avira URL Cloudsafe
              https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=0%Avira URL Cloudsafe
              http://www.bingmapsportal.com0%Avira URL Cloudsafe
              https://dev.ditu.live.com/REST/v1/Locations0%Avira URL Cloudsafe
              https://dev.virtualearth.net/REST/v1/Imagery/Copyright/0%Avira URL Cloudsafe
              https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/T100%Avira URL Cloudphishing
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
              https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/0%Avira URL Cloudsafe
              https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/true
              • Avira URL Cloud: phishing
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000000.00000002.1372138499.000001C7B0068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371520605.000001C7B0067000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000000.00000002.1372163560.000001C7B0077000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371310107.000001C7B0075000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000000.00000002.1372138499.000001C7B0068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372023471.000001C7B002B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371520605.000001C7B0067000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000000.00000002.1372055102.000001C7B003F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/svchost.exe, 00000000.00000003.1371291501.000001C7B0034000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/zLisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B90000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: phishing
                unknown
                https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://standards.iso.org/iso/19770/-2/2009/schema.xsdsvchost.exe, 00000008.00000002.2521584302.000001E2F3685000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2521987156.000001E2F3F20000.00000004.00000020.00020000.00000000.sdmp, regid.1991-06.com.microsoft_Windows-10-Pro.swidtag.8.drfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/uLisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B90000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: phishing
                unknown
                https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371642803.000001C7B005A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371457057.000001C7B006E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372150683.000001C7B0070000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comLisectAVT_2403002A_26.exetrue
                • Avira URL Cloud: phishing
                unknown
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000000.00000002.1372023471.000001C7B002B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000000.00000002.1372070090.000001C7B0042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371656652.000001C7B0041000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dynamic.tsvchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comTLisectAVT_2403002A_26.exe, 00000004.00000002.1303050984.0000000000B7E000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=svchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.bingmapsportal.comsvchost.exe, 00000000.00000002.1372005571.000001C7B0013000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000000.00000002.1372098446.000001C7B0058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371682933.000001C7B0057000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000000.00000002.1372124807.000001C7B0063000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371642803.000001C7B005A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000000.00000002.1372138499.000001C7B0068000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372023471.000001C7B002B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371520605.000001C7B0067000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/TLisectAVT_2403002A_26.exe, 00000009.00000003.1300347634.0000000000AB5000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_26.exe, 00000009.00000002.1935753998.0000000000A9C000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: phishing
                unknown
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJLisectAVT_2403002A_26.exe, 00000009.00000002.1935072040.000000000019D000.00000004.00000010.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000000.00000003.1371457057.000001C7B006E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1372150683.000001C7B0070000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000000.00000003.1371700354.000001C7B0030000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000003.1371538073.000001C7B0062000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                150.119.16.1
                unknownUnited States
                4152USDA-1USfalse
                80.174.132.1
                unknownSpain
                6739ONO-ASCableuropa-ONOESfalse
                72.95.55.1
                unknownUnited States
                701UUNETUSfalse
                139.162.58.75
                unknownNetherlands
                63949LINODE-APLinodeLLCUSfalse
                48.239.46.101
                unknownUnited States
                2686ATGS-MMD-ASUSfalse
                80.174.132.167
                unknownSpain
                6739ONO-ASCableuropa-ONOESfalse
                87.253.190.1
                unknownGermany
                35258ITOSSDEfalse
                87.253.190.2
                unknownGermany
                35258ITOSSDEfalse
                139.162.58.2
                unknownNetherlands
                63949LINODE-APLinodeLLCUSfalse
                139.162.58.1
                unknownNetherlands
                63949LINODE-APLinodeLLCUSfalse
                94.82.132.1
                unknownItaly
                3269ASN-IBSNAZITfalse
                193.191.213.98
                unknownBelgium
                2611BELNETBEfalse
                193.191.213.1
                unknownBelgium
                2611BELNETBEfalse
                62.251.83.65
                unknownNetherlands
                3265XS4ALL-NLAmsterdamNLfalse
                94.82.132.51
                unknownItaly
                3269ASN-IBSNAZITfalse
                57.62.233.1
                unknownBelgium
                2686ATGS-MMD-ASUSfalse
                62.251.83.1
                unknownNetherlands
                3265XS4ALL-NLAmsterdamNLfalse
                26.155.142.1
                unknownUnited States
                7922COMCAST-7922USfalse
                104.140.149.1
                unknownUnited States
                62904EONIX-COMMUNICATIONS-ASBLOCK-62904USfalse
                68.36.231.1
                unknownUnited States
                7922COMCAST-7922USfalse
                90.50.189.27
                unknownFrance
                3215FranceTelecom-OrangeFRfalse
                210.84.101.51
                unknownAustralia
                703UUNETUSfalse
                1.0.209.114
                unknownThailand
                23969TOT-NETTOTPublicCompanyLimitedTHfalse
                48.239.46.2
                unknownUnited States
                2686ATGS-MMD-ASUSfalse
                48.239.46.1
                unknownUnited States
                2686ATGS-MMD-ASUSfalse
                184.73.129.1
                unknownUnited States
                14618AMAZON-AESUSfalse
                72.95.55.167
                unknownUnited States
                701UUNETUSfalse
                IP
                192.168.2.148
                192.168.2.149
                192.168.2.146
                192.168.2.147
                192.168.2.140
                192.168.2.141
                192.168.2.144
                192.168.2.145
                192.168.2.142
                192.168.2.143
                192.168.2.159
                192.168.2.157
                192.168.2.158
                192.168.2.151
                192.168.2.152
                192.168.2.150
                192.168.2.155
                192.168.2.156
                192.168.2.153
                192.168.2.154
                192.168.2.126
                192.168.2.247
                192.168.2.127
                192.168.2.248
                192.168.2.124
                192.168.2.245
                192.168.2.125
                192.168.2.246
                192.168.2.128
                192.168.2.249
                192.168.2.129
                192.168.2.240
                192.168.2.122
                192.168.2.243
                192.168.2.123
                192.168.2.244
                192.168.2.120
                192.168.2.241
                192.168.2.121
                192.168.2.242
                192.168.2.97
                192.168.2.137
                192.168.2.96
                192.168.2.138
                192.168.2.99
                192.168.2.135
                192.168.2.98
                192.168.2.136
                192.168.2.139
                192.168.2.250
                192.168.2.130
                192.168.2.251
                192.168.2.91
                192.168.2.90
                192.168.2.93
                192.168.2.133
                192.168.2.254
                192.168.2.92
                192.168.2.134
                192.168.2.95
                192.168.2.131
                192.168.2.252
                192.168.2.94
                192.168.2.132
                192.168.2.253
                192.168.2.104
                192.168.2.225
                192.168.2.105
                192.168.2.226
                192.168.2.102
                192.168.2.223
                192.168.2.103
                192.168.2.224
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1481028
                Start date and time:2024-07-25 03:04:05 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 53s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:16
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:LisectAVT_2403002A_26.exe
                Detection:MAL
                Classification:mal100.rans.expl.evad.winEXE@14/3@1/100
                EGA Information:
                • Successful, ratio: 66.7%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 93.184.221.240
                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target tasksche.exe, PID 8068 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                21:05:36API Interceptor112x Sleep call for process: LisectAVT_2403002A_26.exe modified
                21:06:00API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comzbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                • 104.16.166.228
                qt680eucI4.dllGet hashmaliciousWannacryBrowse
                • 104.16.167.228
                1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                • 104.16.166.228
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                • 104.16.167.228
                qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                • 104.17.244.81
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                • 104.17.244.81
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                • 104.16.173.80
                02353699.exeGet hashmaliciousWannacryBrowse
                • 104.16.173.80
                05894899.exeGet hashmaliciousWannacryBrowse
                • 104.17.244.81
                dNDbcC4Trx.exeGet hashmaliciousWannacryBrowse
                • 104.17.244.81
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                ONO-ASCableuropa-ONOES92.249.48.47-skid.mpsl-2024-07-20T09_04_17.elfGet hashmaliciousMirai, MoobotBrowse
                • 85.136.80.202
                MCiOZ89mRZ.elfGet hashmaliciousMiraiBrowse
                • 62.81.118.61
                jew.arm6.elfGet hashmaliciousMiraiBrowse
                • 84.124.178.145
                jew.arm7.elfGet hashmaliciousMiraiBrowse
                • 85.251.45.40
                arm7.elfGet hashmaliciousMiraiBrowse
                • 89.140.65.57
                arm4-20240709-0417.elfGet hashmaliciousMiraiBrowse
                • 213.227.41.114
                arm7-20240707-0306.elfGet hashmaliciousMiraiBrowse
                • 84.127.11.101
                3jI8pe3luL.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                • 89.140.65.71
                jhpg1LVUrZ.elfGet hashmaliciousMiraiBrowse
                • 84.125.28.68
                h1dNV0rAcX.elfGet hashmaliciousMiraiBrowse
                • 62.81.143.73
                USDA-1USCSrnw4L6fz.elfGet hashmaliciousUnknownBrowse
                • 199.131.137.24
                YzP1CRQ7HF.elfGet hashmaliciousUnknownBrowse
                • 170.146.136.108
                faBNhIKHq4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                • 166.2.82.27
                jklarmGet hashmaliciousUnknownBrowse
                • 199.159.109.41
                arm.elfGet hashmaliciousMiraiBrowse
                • 166.5.31.183
                botx.x86.elfGet hashmaliciousMiraiBrowse
                • 199.149.73.110
                botx.arm.elfGet hashmaliciousMiraiBrowse
                • 199.130.11.121
                botx.mips.elfGet hashmaliciousMiraiBrowse
                • 199.148.179.188
                jew.arm6.elfGet hashmaliciousMiraiBrowse
                • 199.136.182.165
                jew.m68k.elfGet hashmaliciousUnknownBrowse
                • 199.151.202.36
                UUNETUSgrVH45EWPn.exeGet hashmaliciousUnknownBrowse
                • 100.116.12.1
                94.156.8.9-skid.mips-2024-07-23T17_40_11.elfGet hashmaliciousMirai, MoobotBrowse
                • 71.101.215.230
                94.156.8.9-skid.arm5-2024-07-23T17_40_09.elfGet hashmaliciousMirai, MoobotBrowse
                • 173.77.121.51
                94.156.8.9-skid.x86_64-2024-07-23T17_40_08.elfGet hashmaliciousMirai, MoobotBrowse
                • 208.215.57.254
                94.156.8.9-skid.ppc-2024-07-23T17_40_07.elfGet hashmaliciousMirai, MoobotBrowse
                • 63.94.223.112
                94.156.8.9-skid.sh4-2024-07-23T17_40_06.elfGet hashmaliciousMirai, MoobotBrowse
                • 198.228.155.108
                wAO7F8FbEz.elfGet hashmaliciousUnknownBrowse
                • 70.18.43.221
                yIRn1ZmsQF.elfGet hashmaliciousUnknownBrowse
                • 108.54.247.43
                0GJSC4Ua2K.elfGet hashmaliciousUnknownBrowse
                • 63.105.154.67
                BJu5gH74uD.elfGet hashmaliciousUnknownBrowse
                • 65.230.62.4
                LINODE-APLinodeLLCUSLisectAVT_2403002A_114.exeGet hashmaliciousRemcosBrowse
                • 173.255.204.62
                https://spotifyinfo.hosted.phplist.com/lists/lt.php?tid=cE5RAldVVgBRVk4GBlYLHwNRC1IeAVBSBUxVVAcHVwQBBlFcVwJLBgMAUwMCUQsfVgpcXR4NBwcPTFpVB1JOB1kGBwdXVA5VXgVWSAMEBgIPA1pSHglWUgdMV1YDUU5dCgYGSQcHDlBTBQADVVcCCwGet hashmaliciousUnknownBrowse
                • 45.33.29.14
                ZYlsAQi8bj.exeGet hashmaliciousFloodFixBrowse
                • 45.56.79.23
                http://bestfreinds.orgGet hashmaliciousUnknownBrowse
                • 198.58.118.167
                http://hwylovermk.shop/product_details/5509027.htmlGet hashmaliciousUnknownBrowse
                • 45.79.24.154
                nZ8ZmTEBr7.exeGet hashmaliciousUnknownBrowse
                • 45.56.90.99
                nZ8ZmTEBr7.exeGet hashmaliciousUnknownBrowse
                • 45.56.90.99
                K7Vp9qOJMN.exeGet hashmaliciousRemcosBrowse
                • 173.255.204.62
                Quotation.xlsGet hashmaliciousRemcosBrowse
                • 173.255.204.62
                eqqjbbjMlt.elfGet hashmaliciousUnknownBrowse
                • 172.104.238.243
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                28a2c9bd18a11de089ef85a160da29e4LisectAVT_2403002A_223.exeGet hashmaliciousWannacryBrowse
                • 52.165.165.26
                hostr.exeGet hashmaliciousUnknownBrowse
                • 52.165.165.26
                FD79E637E91EC51483559DB807645755DBA0EF95199582FB48D4275445DBED5A.exeGet hashmaliciousUnknownBrowse
                • 52.165.165.26
                Fantom.exeGet hashmaliciousBdaejecBrowse
                • 52.165.165.26
                https://cafehanoi.mx-router-ii.com/c/gjdg/vddcazcw/8-_r8_yol4cGet hashmaliciousPhisherBrowse
                • 52.165.165.26
                FC37EF5F08206CEEC28FA454C48311A16A8B9DAFC446BBC10E7A1DE1037BC1F8.exeGet hashmaliciousUnknownBrowse
                • 52.165.165.26
                https://chrome.google.com/webstore/detail/grass-extension/ilehaonighjijnmpnagapkhpcdbhclfg?hl=en&authuser=0Get hashmaliciousUnknownBrowse
                • 52.165.165.26
                F69B3AEC41D733F9A32066220188A064E26A2399BEEBF5EA2F722EF4ADBC2CB8.exeGet hashmaliciousUnknownBrowse
                • 52.165.165.26
                F10BAFE0C62DE2DA1705887BF5130BD10A300DA0CA00226076E1288BAE626560.exeGet hashmaliciousUnknownBrowse
                • 52.165.165.26
                EngRat v0.1.0B.exeGet hashmaliciousUnknownBrowse
                • 52.165.165.26
                No context
                Process:C:\Windows\System32\svchost.exe
                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Category:dropped
                Size (bytes):999
                Entropy (8bit):4.966299883488245
                Encrypted:false
                SSDEEP:24:Jd4T7gw4TchTGBLtKEHcHGuDyeHRuDye6MGFiP6euDyRtz:34T53VGLv8HGuDyeHRuDye6MGFiP6euy
                MD5:24567B9212F806F6E3E27CDEB07728C0
                SHA1:371AE77042FFF52327BF4B929495D5603404107D
                SHA-256:82F352AD3C9B3E58ECD3207EDC38D5F01B14D968DA908406BD60FD93230B69F6
                SHA-512:5D5E65FCD9061DADC760C9B3124547F2BABEB49FD56A2FD2FE2AD2211A1CB15436DB24308A0B5A87DA24EC6AB2A9B0C5242D828BE85BD1B2683F9468CE310904
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:.<?xml version="1.0" encoding="utf-8"?>..<software_identification_tag xmlns="http://standards.iso.org/iso/19770/-2/2009/schema.xsd">...<entitlement_required_indicator>true</entitlement_required_indicator>...<product_title>Windows 10 Pro</product_title>...<product_version>....<name>10.0.19041.1865</name>....<numeric>.....<major>10</major>.....<minor>0</minor>.....<build>19041</build>.....<review>1865</review>....</numeric>...</product_version>...<software_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_creator>...<software_licensor>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_licensor>...<software_id>....<unique_id>Windows-10-Pro</unique_id>....<tag_creator_regid>regid.1991-06.com.microsoft</tag_creator_regid>...</software_id>...<tag_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</tag_creator>..</software_identification_tag>..
                Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:modified
                Size (bytes):2464
                Entropy (8bit):3.2453870436295627
                Encrypted:false
                SSDEEP:24:QOaqdmuF3rlL+kWReHgHttUKlDENh+pyMySn6tUKlDENh+pyMySwwIPVxcwIPVxY:FaqdF7J+AAHdKoqKFxcxkFJ
                MD5:E03D4FB766144707149AAF220C7C93EC
                SHA1:1217AD354D01ECEC3AEEC8184E5DFD2D3F87FC0D
                SHA-256:411FADCACC0B86A9FDF3349FFD51C1C6DFEEE2D88DCD044A4B0B0E14775CBEC6
                SHA-512:FC60EE3CB2DADDA077A95E68CA5D1BC34DD99BE4DA34001CA032578355C37E039BBD81A48FFD09F7F37C35A0593E4E4371F0AEFEF2452592A8975B453C65EF37
                Malicious:false
                Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. W.e.d. .. J.u.l. .. 2.4. .. 2.0.2.4. .2.1.:.0.6.:.0.0.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                Process:C:\Users\user\Desktop\LisectAVT_2403002A_26.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):3514368
                Entropy (8bit):7.172392869878933
                Encrypted:false
                SSDEEP:49152:nQ6MaPbcpVACtQF5Z+TSqTdX1HcQY6SAw5dZnvxJM0H9PAMEcaEau3K:Q63opJtK5ZcSUDcn6SAcdZvxWa9P593K
                MD5:3DF2667EF94776EEB272A1404801F118
                SHA1:0741698E6D3460284494B239BF6BAC7D9E0D3A99
                SHA-256:891FA5F91382FD21322DF4B0137F6C865D96FE376C88F6849592CD4942254520
                SHA-512:705921A25F6245E553358517A98996DEF0DCC878037F73BD332EE6DDD56CB208948B45A00CE42FBD94972E99A8959F44458DCF3669AC798625BFAEC8FDAF6DC6
                Malicious:true
                Yara Hits:
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 97%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.146766077869659
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:LisectAVT_2403002A_26.exe
                File size:3'723'271 bytes
                MD5:eb4f4c455604f0f1ce111fbefecd9e21
                SHA1:0a31ea9a024ecf6536283e1eda1f48458b10cbed
                SHA256:3f48a8d80cc55a1fbe9a210b60b07f3677b736b8a02d5408697d9df54a276776
                SHA512:e73c0fd6bf49a94ab6b1f02fe52fb86fee8040a1c4ff61d555ea5cbde6769b84c8b3ae911f3897f90f9d0a68124410938b65c604e3176bad208d9eb43b2a3acb
                SSDEEP:98304:y763opJtK5ZcSUDcn6SAcdZvxWa9P593:y763atKZcxcnZAcMadz
                TLSH:95063368622CD6BCE1051DB400B3C63AA6763C6556FF6A0F8B504DA73D53B6F7BC0A42
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=..A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L..
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x409a16
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:
                Time Stamp:0x4CE78ECC [Sat Nov 20 09:03:08 2010 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:9ecee117164e0b870a53dd187cdd7174
                Instruction
                push ebp
                mov ebp, esp
                push FFFFFFFFh
                push 0040A1A0h
                push 00409BA2h
                mov eax, dword ptr fs:[00000000h]
                push eax
                mov dword ptr fs:[00000000h], esp
                sub esp, 68h
                push ebx
                push esi
                push edi
                mov dword ptr [ebp-18h], esp
                xor ebx, ebx
                mov dword ptr [ebp-04h], ebx
                push 00000002h
                call dword ptr [0040A0C0h]
                pop ecx
                or dword ptr [0070F894h], FFFFFFFFh
                or dword ptr [0070F898h], FFFFFFFFh
                call dword ptr [0040A0C8h]
                mov ecx, dword ptr [0070F88Ch]
                mov dword ptr [eax], ecx
                call dword ptr [0040A0CCh]
                mov ecx, dword ptr [0070F888h]
                mov dword ptr [eax], ecx
                mov eax, dword ptr [0040A0E4h]
                mov eax, dword ptr [eax]
                mov dword ptr [0070F890h], eax
                call 00007F0461113981h
                cmp dword ptr [00431410h], ebx
                jne 00007F046111386Eh
                push 00409B9Eh
                call dword ptr [0040A0D4h]
                pop ecx
                call 00007F0461113953h
                push 0040B010h
                push 0040B00Ch
                call 00007F046111393Eh
                mov eax, dword ptr [0070F884h]
                mov dword ptr [ebp-6Ch], eax
                lea eax, dword ptr [ebp-6Ch]
                push eax
                push dword ptr [0070F880h]
                lea eax, dword ptr [ebp-64h]
                push eax
                lea eax, dword ptr [ebp-70h]
                push eax
                lea eax, dword ptr [ebp-60h]
                push eax
                call dword ptr [0040A0DCh]
                push 0040B008h
                push 0040B000h
                call 00007F046111390Bh
                Programming Language:
                • [C++] VS98 (6.0) SP6 build 8804
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xa1e00xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3100000x35a454.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0xa0000x188.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x8bca0x9000799fa6f54ef4176da2990896faea65d8False0.534423828125data6.1345234015658825IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0xa0000x9980x1000d8037d744b539326c06e897625751cc9False0.29345703125data3.503615586181224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xb0000x30489c0x270001a70bbc4e633f193e7d92914eeb4a1f3unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x3100000x35a4540x35b0009a4fcb263cf46b6d669a3fa1579af01cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                R0x3100a40x35a000PE32 executable (GUI) Intel 80386, for MS WindowsEnglishUnited States0.8971652984619141
                RT_VERSION0x66a0a40x3b0dataEnglishUnited States0.7002118644067796
                DLLImport
                KERNEL32.dllWaitForSingleObject, InterlockedIncrement, GetCurrentThreadId, GetCurrentThread, ReadFile, GetFileSize, CreateFileA, MoveFileExA, SizeofResource, TerminateThread, LoadResource, FindResourceA, GetProcAddress, GetModuleHandleW, ExitProcess, GetModuleFileNameA, LocalFree, LocalAlloc, CloseHandle, InterlockedDecrement, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, GlobalAlloc, GlobalFree, QueryPerformanceFrequency, QueryPerformanceCounter, GetTickCount, LockResource, Sleep, GetStartupInfoA, GetModuleHandleA
                ADVAPI32.dllStartServiceCtrlDispatcherA, RegisterServiceCtrlHandlerA, ChangeServiceConfig2A, SetServiceStatus, OpenSCManagerA, CreateServiceA, CloseServiceHandle, StartServiceA, CryptGenRandom, CryptAcquireContextA, OpenServiceA
                WS2_32.dllclosesocket, recv, send, htonl, ntohl, WSAStartup, inet_ntoa, ioctlsocket, select, htons, socket, connect, inet_addr
                MSVCP60.dll??1_Lockit@std@@QAE@XZ, ??0_Lockit@std@@QAE@XZ
                iphlpapi.dllGetAdaptersInfo, GetPerAdapterInfo
                WININET.dllInternetOpenA, InternetOpenUrlA, InternetCloseHandle
                MSVCRT.dll__set_app_type, _stricmp, __p__fmode, __p__commode, _except_handler3, __setusermatherr, _initterm, __getmainargs, _acmdln, _adjust_fdiv, _controlfp, exit, _XcptFilter, _exit, _onexit, __dllonexit, free, ??2@YAPAXI@Z, _ftol, sprintf, _endthreadex, strncpy, rand, _beginthreadex, __CxxFrameHandler, srand, time, __p___argc
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                2024-07-25T03:05:03.248798+0200TCP2031515ET MALWARE Known Sinkhole Response Kryptos Logic8049705104.16.167.228192.168.2.11
                2024-07-25T03:05:59.261810+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435011852.165.165.26192.168.2.11
                2024-07-25T03:05:21.160650+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434989652.165.165.26192.168.2.11
                2024-07-25T03:05:03.247481+0200TCP2024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 54970580192.168.2.11104.16.167.228
                2024-07-25T03:05:02.317541+0200TCP2024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 54970480192.168.2.11104.16.167.228
                2024-07-25T03:05:01.754726+0200UDP2024291ET MALWARE Possible WannaCry DNS Lookup 16423653192.168.2.111.1.1.1
                2024-07-25T03:05:02.319513+0200TCP2031515ET MALWARE Known Sinkhole Response Kryptos Logic8049704104.16.167.228192.168.2.11
                TimestampSource PortDest PortSource IPDest IP
                Jul 25, 2024 03:04:56.537849903 CEST49671443192.168.2.11204.79.197.203
                Jul 25, 2024 03:04:58.584728956 CEST49674443192.168.2.11173.222.162.42
                Jul 25, 2024 03:04:58.678505898 CEST49673443192.168.2.11173.222.162.42
                Jul 25, 2024 03:05:00.382181883 CEST49676443192.168.2.1120.189.173.3
                Jul 25, 2024 03:05:00.694083929 CEST49676443192.168.2.1120.189.173.3
                Jul 25, 2024 03:05:01.303453922 CEST49676443192.168.2.1120.189.173.3
                Jul 25, 2024 03:05:01.350385904 CEST49671443192.168.2.11204.79.197.203
                Jul 25, 2024 03:05:01.769368887 CEST4970480192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:01.774236917 CEST8049704104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:01.774322033 CEST4970480192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:01.774465084 CEST4970480192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:01.779251099 CEST8049704104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:02.317466974 CEST8049704104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:02.317540884 CEST4970480192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:02.317915916 CEST4970480192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:02.319513083 CEST8049704104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:02.319586039 CEST4970480192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:02.325128078 CEST8049704104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:02.506567001 CEST49676443192.168.2.1120.189.173.3
                Jul 25, 2024 03:05:02.760409117 CEST4970580192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:02.766112089 CEST8049705104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:02.766197920 CEST4970580192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:02.766397953 CEST4970580192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:02.771229029 CEST8049705104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:03.247416019 CEST8049705104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:03.247481108 CEST4970580192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:03.247562885 CEST4970580192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:03.248797894 CEST8049705104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:03.248841047 CEST4970580192.168.2.11104.16.167.228
                Jul 25, 2024 03:05:03.252310991 CEST8049705104.16.167.228192.168.2.11
                Jul 25, 2024 03:05:03.321157932 CEST49706445192.168.2.11210.194.28.48
                Jul 25, 2024 03:05:03.325998068 CEST44549706210.194.28.48192.168.2.11
                Jul 25, 2024 03:05:03.326070070 CEST49706445192.168.2.11210.194.28.48
                Jul 25, 2024 03:05:03.326107025 CEST49706445192.168.2.11210.194.28.48
                Jul 25, 2024 03:05:03.331269979 CEST44549706210.194.28.48192.168.2.11
                Jul 25, 2024 03:05:03.331408978 CEST44549706210.194.28.48192.168.2.11
                Jul 25, 2024 03:05:03.331495047 CEST49706445192.168.2.11210.194.28.48
                Jul 25, 2024 03:05:03.341075897 CEST49707445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:03.346745968 CEST44549707210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:03.346808910 CEST49707445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:03.347503901 CEST49707445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:03.350807905 CEST49708445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:03.353131056 CEST44549707210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:03.353176117 CEST49707445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:03.356513023 CEST44549708210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:03.356575012 CEST49708445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:03.356614113 CEST49708445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:03.361560106 CEST44549708210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:04.915987015 CEST49676443192.168.2.1120.189.173.3
                Jul 25, 2024 03:05:05.321266890 CEST49731445192.168.2.1163.131.224.105
                Jul 25, 2024 03:05:05.326374054 CEST4454973163.131.224.105192.168.2.11
                Jul 25, 2024 03:05:05.326457024 CEST49731445192.168.2.1163.131.224.105
                Jul 25, 2024 03:05:05.326510906 CEST49731445192.168.2.1163.131.224.105
                Jul 25, 2024 03:05:05.326752901 CEST49732445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:05.331499100 CEST4454973263.131.224.1192.168.2.11
                Jul 25, 2024 03:05:05.331547976 CEST49732445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:05.331621885 CEST49732445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:05.331945896 CEST4454973163.131.224.105192.168.2.11
                Jul 25, 2024 03:05:05.331998110 CEST49731445192.168.2.1163.131.224.105
                Jul 25, 2024 03:05:05.333180904 CEST49733445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:05.336946964 CEST4454973263.131.224.1192.168.2.11
                Jul 25, 2024 03:05:05.336992979 CEST49732445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:05.338233948 CEST4454973363.131.224.1192.168.2.11
                Jul 25, 2024 03:05:05.338303089 CEST49733445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:05.338356018 CEST49733445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:05.343518972 CEST4454973363.131.224.1192.168.2.11
                Jul 25, 2024 03:05:07.336184978 CEST49756445192.168.2.11158.15.154.136
                Jul 25, 2024 03:05:07.341073990 CEST44549756158.15.154.136192.168.2.11
                Jul 25, 2024 03:05:07.341172934 CEST49756445192.168.2.11158.15.154.136
                Jul 25, 2024 03:05:07.341272116 CEST49756445192.168.2.11158.15.154.136
                Jul 25, 2024 03:05:07.341509104 CEST49757445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:07.346340895 CEST44549757158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:07.346437931 CEST49757445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:07.346482038 CEST49757445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:07.346632957 CEST44549756158.15.154.136192.168.2.11
                Jul 25, 2024 03:05:07.346685886 CEST49756445192.168.2.11158.15.154.136
                Jul 25, 2024 03:05:07.347625971 CEST49758445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:07.351671934 CEST44549757158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:07.351758957 CEST49757445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:07.353202105 CEST44549758158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:07.353276968 CEST49758445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:07.353332996 CEST49758445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:07.358474970 CEST44549758158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:08.194183111 CEST49674443192.168.2.11173.222.162.42
                Jul 25, 2024 03:05:08.287807941 CEST49673443192.168.2.11173.222.162.42
                Jul 25, 2024 03:05:09.351850986 CEST49781445192.168.2.1148.239.46.101
                Jul 25, 2024 03:05:09.356741905 CEST4454978148.239.46.101192.168.2.11
                Jul 25, 2024 03:05:09.356821060 CEST49781445192.168.2.1148.239.46.101
                Jul 25, 2024 03:05:09.357034922 CEST49782445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:09.358942986 CEST49781445192.168.2.1148.239.46.101
                Jul 25, 2024 03:05:09.361928940 CEST4454978248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:09.361993074 CEST49782445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:09.362021923 CEST49782445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:09.363101006 CEST49783445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:09.364512920 CEST4454978148.239.46.101192.168.2.11
                Jul 25, 2024 03:05:09.366312027 CEST49781445192.168.2.1148.239.46.101
                Jul 25, 2024 03:05:09.367280006 CEST4454978248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:09.367377996 CEST4454978248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:09.367428064 CEST49782445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:09.367826939 CEST4454978348.239.46.1192.168.2.11
                Jul 25, 2024 03:05:09.367877960 CEST49783445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:09.367959976 CEST49783445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:09.373203993 CEST4454978348.239.46.1192.168.2.11
                Jul 25, 2024 03:05:09.725425005 CEST49676443192.168.2.1120.189.173.3
                Jul 25, 2024 03:05:10.423316002 CEST44349703173.222.162.42192.168.2.11
                Jul 25, 2024 03:05:10.423403025 CEST49703443192.168.2.11173.222.162.42
                Jul 25, 2024 03:05:10.424669027 CEST44349703173.222.162.42192.168.2.11
                Jul 25, 2024 03:05:10.424711943 CEST49703443192.168.2.11173.222.162.42
                Jul 25, 2024 03:05:10.426152945 CEST44349703173.222.162.42192.168.2.11
                Jul 25, 2024 03:05:10.426194906 CEST49703443192.168.2.11173.222.162.42
                Jul 25, 2024 03:05:10.959698915 CEST49671443192.168.2.11204.79.197.203
                Jul 25, 2024 03:05:11.367083073 CEST49806445192.168.2.1187.253.190.16
                Jul 25, 2024 03:05:11.371978045 CEST4454980687.253.190.16192.168.2.11
                Jul 25, 2024 03:05:11.372050047 CEST49806445192.168.2.1187.253.190.16
                Jul 25, 2024 03:05:11.372134924 CEST49806445192.168.2.1187.253.190.16
                Jul 25, 2024 03:05:11.372356892 CEST49807445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:11.377228022 CEST4454980787.253.190.1192.168.2.11
                Jul 25, 2024 03:05:11.377288103 CEST49807445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:11.377329111 CEST49807445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:11.377865076 CEST4454980687.253.190.16192.168.2.11
                Jul 25, 2024 03:05:11.377913952 CEST49806445192.168.2.1187.253.190.16
                Jul 25, 2024 03:05:11.378427982 CEST49808445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:11.384459972 CEST4454980787.253.190.1192.168.2.11
                Jul 25, 2024 03:05:11.384471893 CEST4454980787.253.190.1192.168.2.11
                Jul 25, 2024 03:05:11.384489059 CEST4454980887.253.190.1192.168.2.11
                Jul 25, 2024 03:05:11.384531975 CEST49807445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:11.384566069 CEST49808445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:11.384638071 CEST49808445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:11.389484882 CEST4454980887.253.190.1192.168.2.11
                Jul 25, 2024 03:05:13.041135073 CEST4454980887.253.190.1192.168.2.11
                Jul 25, 2024 03:05:13.041199923 CEST49808445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:13.041238070 CEST49808445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:13.041312933 CEST49808445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:13.046014071 CEST4454980887.253.190.1192.168.2.11
                Jul 25, 2024 03:05:13.046255112 CEST4454980887.253.190.1192.168.2.11
                Jul 25, 2024 03:05:13.383146048 CEST49831445192.168.2.11196.52.62.188
                Jul 25, 2024 03:05:13.388330936 CEST44549831196.52.62.188192.168.2.11
                Jul 25, 2024 03:05:13.388408899 CEST49831445192.168.2.11196.52.62.188
                Jul 25, 2024 03:05:13.388499022 CEST49831445192.168.2.11196.52.62.188
                Jul 25, 2024 03:05:13.388725042 CEST49832445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:13.393939018 CEST44549832196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:13.394117117 CEST49832445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:13.394117117 CEST49832445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:13.394793987 CEST44549831196.52.62.188192.168.2.11
                Jul 25, 2024 03:05:13.394851923 CEST49831445192.168.2.11196.52.62.188
                Jul 25, 2024 03:05:13.394908905 CEST49833445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:13.399714947 CEST44549833196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:13.399734020 CEST44549832196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:13.399843931 CEST49833445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:13.399843931 CEST49833445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:13.399970055 CEST49832445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:13.404721975 CEST44549833196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:15.397702932 CEST49854445192.168.2.1190.50.189.27
                Jul 25, 2024 03:05:15.403073072 CEST4454985490.50.189.27192.168.2.11
                Jul 25, 2024 03:05:15.403219938 CEST49854445192.168.2.1190.50.189.27
                Jul 25, 2024 03:05:15.403240919 CEST49854445192.168.2.1190.50.189.27
                Jul 25, 2024 03:05:15.403493881 CEST49855445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:15.409393072 CEST4454985590.50.189.1192.168.2.11
                Jul 25, 2024 03:05:15.409589052 CEST49855445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:15.409589052 CEST49855445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:15.409854889 CEST49856445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:15.411694050 CEST4454985490.50.189.27192.168.2.11
                Jul 25, 2024 03:05:15.412672043 CEST4454985490.50.189.27192.168.2.11
                Jul 25, 2024 03:05:15.412759066 CEST49854445192.168.2.1190.50.189.27
                Jul 25, 2024 03:05:15.415879965 CEST4454985690.50.189.1192.168.2.11
                Jul 25, 2024 03:05:15.415997028 CEST49856445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:15.415997028 CEST49856445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:15.416714907 CEST4454985590.50.189.1192.168.2.11
                Jul 25, 2024 03:05:15.416842937 CEST49855445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:15.421233892 CEST4454985690.50.189.1192.168.2.11
                Jul 25, 2024 03:05:16.053913116 CEST49862445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:16.058844090 CEST4454986287.253.190.1192.168.2.11
                Jul 25, 2024 03:05:16.058968067 CEST49862445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:16.059027910 CEST49862445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:16.063853025 CEST4454986287.253.190.1192.168.2.11
                Jul 25, 2024 03:05:17.413909912 CEST49880445192.168.2.11139.162.58.75
                Jul 25, 2024 03:05:17.418836117 CEST44549880139.162.58.75192.168.2.11
                Jul 25, 2024 03:05:17.418910027 CEST49880445192.168.2.11139.162.58.75
                Jul 25, 2024 03:05:17.418978930 CEST49880445192.168.2.11139.162.58.75
                Jul 25, 2024 03:05:17.419174910 CEST49881445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:17.423918962 CEST44549881139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:17.424001932 CEST49881445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:17.424027920 CEST49881445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:17.424290895 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:17.424354076 CEST44549880139.162.58.75192.168.2.11
                Jul 25, 2024 03:05:17.424403906 CEST49880445192.168.2.11139.162.58.75
                Jul 25, 2024 03:05:17.429028034 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:17.429096937 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:17.429137945 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:17.429306984 CEST44549881139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:17.429352045 CEST49881445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:17.433893919 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:17.731230974 CEST4454986287.253.190.1192.168.2.11
                Jul 25, 2024 03:05:17.731347084 CEST49862445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:17.731462955 CEST49862445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:17.731544971 CEST49862445192.168.2.1187.253.190.1
                Jul 25, 2024 03:05:17.736768007 CEST4454986287.253.190.1192.168.2.11
                Jul 25, 2024 03:05:17.737150908 CEST4454986287.253.190.1192.168.2.11
                Jul 25, 2024 03:05:17.788512945 CEST49885445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:17.793519020 CEST4454988587.253.190.2192.168.2.11
                Jul 25, 2024 03:05:17.793656111 CEST49885445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:17.793752909 CEST49885445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:17.794089079 CEST49886445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:17.798949957 CEST4454988687.253.190.2192.168.2.11
                Jul 25, 2024 03:05:17.799292088 CEST4454988587.253.190.2192.168.2.11
                Jul 25, 2024 03:05:17.799305916 CEST49886445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:17.799305916 CEST49886445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:17.799523115 CEST4454988587.253.190.2192.168.2.11
                Jul 25, 2024 03:05:17.799938917 CEST49885445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:17.804060936 CEST4454988687.253.190.2192.168.2.11
                Jul 25, 2024 03:05:18.552130938 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:18.552181005 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:18.552261114 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:18.554349899 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:18.554364920 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:19.334712982 CEST49676443192.168.2.1120.189.173.3
                Jul 25, 2024 03:05:19.429008007 CEST49908445192.168.2.1156.26.26.48
                Jul 25, 2024 03:05:19.968110085 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:19.968166113 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:19.968200922 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:19.968242884 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:19.968306065 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:19.968359947 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:19.968405008 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:19.968455076 CEST49882445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:19.972302914 CEST4454990856.26.26.48192.168.2.11
                Jul 25, 2024 03:05:19.972392082 CEST49908445192.168.2.1156.26.26.48
                Jul 25, 2024 03:05:19.972429991 CEST49908445192.168.2.1156.26.26.48
                Jul 25, 2024 03:05:19.972709894 CEST49912445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:19.973634005 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:19.973649979 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:19.973773956 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:19.973963022 CEST44549882139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:19.977982044 CEST4454991256.26.26.1192.168.2.11
                Jul 25, 2024 03:05:19.978046894 CEST49912445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:19.978133917 CEST49912445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:19.978282928 CEST4454990856.26.26.48192.168.2.11
                Jul 25, 2024 03:05:19.978327990 CEST49908445192.168.2.1156.26.26.48
                Jul 25, 2024 03:05:19.978642941 CEST49913445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:19.985713959 CEST4454991256.26.26.1192.168.2.11
                Jul 25, 2024 03:05:19.985861063 CEST4454991356.26.26.1192.168.2.11
                Jul 25, 2024 03:05:19.985872030 CEST4454991256.26.26.1192.168.2.11
                Jul 25, 2024 03:05:19.985919952 CEST49913445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:19.985944033 CEST49912445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:19.986010075 CEST49913445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:19.990756035 CEST4454991356.26.26.1192.168.2.11
                Jul 25, 2024 03:05:20.135463953 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:20.135535955 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:20.137990952 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:20.138005018 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:20.138348103 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:20.178457022 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:20.917036057 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:20.960500956 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.159455061 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.159523010 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.159544945 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.159584999 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.159626961 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:21.159634113 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.159657001 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.159667969 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:21.159703970 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:21.160223007 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.160295963 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:21.160301924 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.160417080 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.160592079 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:21.444881916 CEST49936445192.168.2.11104.140.149.141
                Jul 25, 2024 03:05:21.449718952 CEST44549936104.140.149.141192.168.2.11
                Jul 25, 2024 03:05:21.449978113 CEST49936445192.168.2.11104.140.149.141
                Jul 25, 2024 03:05:21.454617023 CEST49936445192.168.2.11104.140.149.141
                Jul 25, 2024 03:05:21.454672098 CEST49937445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:21.459455013 CEST44549937104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:21.459558964 CEST49937445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:21.459599018 CEST49937445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:21.459621906 CEST44549936104.140.149.141192.168.2.11
                Jul 25, 2024 03:05:21.459738970 CEST49936445192.168.2.11104.140.149.141
                Jul 25, 2024 03:05:21.460167885 CEST49938445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:21.464998960 CEST44549938104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:21.465073109 CEST49938445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:21.465112925 CEST49938445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:21.465231895 CEST44549937104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:21.465331078 CEST49937445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:21.469871998 CEST44549938104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:21.842701912 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:21.842751980 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:21.842777014 CEST49896443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:21.842791080 CEST4434989652.165.165.26192.168.2.11
                Jul 25, 2024 03:05:22.975578070 CEST49954445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:22.980659962 CEST44549954139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:22.980746984 CEST49954445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:22.980771065 CEST49954445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:22.985553026 CEST44549954139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:23.460340977 CEST49958445192.168.2.11202.46.46.52
                Jul 25, 2024 03:05:23.465147018 CEST44549958202.46.46.52192.168.2.11
                Jul 25, 2024 03:05:23.465214968 CEST49958445192.168.2.11202.46.46.52
                Jul 25, 2024 03:05:23.465267897 CEST49958445192.168.2.11202.46.46.52
                Jul 25, 2024 03:05:23.465434074 CEST49960445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:23.470269918 CEST44549960202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:23.470343113 CEST49960445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:23.470371962 CEST49960445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:23.470568895 CEST44549958202.46.46.52192.168.2.11
                Jul 25, 2024 03:05:23.470820904 CEST49958445192.168.2.11202.46.46.52
                Jul 25, 2024 03:05:23.471052885 CEST49961445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:23.475824118 CEST44549961202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:23.476114035 CEST44549960202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:23.476164103 CEST49961445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:23.476164103 CEST49961445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:23.476306915 CEST49960445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:23.481076002 CEST44549961202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:24.713586092 CEST44549708210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:24.713676929 CEST49708445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:24.713726997 CEST49708445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:24.713809967 CEST49708445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:24.718792915 CEST44549708210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:24.718813896 CEST44549708210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:25.080662012 CEST44549954139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:25.080738068 CEST49954445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:25.080785990 CEST49954445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:25.080868006 CEST49954445192.168.2.11139.162.58.1
                Jul 25, 2024 03:05:25.085648060 CEST44549954139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:25.085745096 CEST44549954139.162.58.1192.168.2.11
                Jul 25, 2024 03:05:25.132150888 CEST49980445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:25.137001991 CEST44549980139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:25.137144089 CEST49980445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:25.137248039 CEST49980445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:25.138365030 CEST49981445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:25.142982960 CEST44549980139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:25.143057108 CEST49980445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:25.143151999 CEST44549981139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:25.143265963 CEST49981445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:25.143265963 CEST49981445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:25.148204088 CEST44549981139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:25.475941896 CEST49985445192.168.2.11184.73.129.31
                Jul 25, 2024 03:05:25.480899096 CEST44549985184.73.129.31192.168.2.11
                Jul 25, 2024 03:05:25.481013060 CEST49985445192.168.2.11184.73.129.31
                Jul 25, 2024 03:05:25.481194019 CEST49985445192.168.2.11184.73.129.31
                Jul 25, 2024 03:05:25.481509924 CEST49986445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:25.487039089 CEST44549986184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:25.487077951 CEST44549985184.73.129.31192.168.2.11
                Jul 25, 2024 03:05:25.487108946 CEST49986445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:25.487131119 CEST49985445192.168.2.11184.73.129.31
                Jul 25, 2024 03:05:25.487261057 CEST49986445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:25.487729073 CEST49987445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:25.492494106 CEST44549987184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:25.492563963 CEST49987445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:25.492608070 CEST49987445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:25.494131088 CEST44549986184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:25.494183064 CEST49986445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:25.497493029 CEST44549987184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:25.511930943 CEST44549961202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:25.512041092 CEST49961445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:25.512171030 CEST49961445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:25.512171030 CEST49961445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:25.518279076 CEST44549961202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:25.518295050 CEST44549961202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:26.715066910 CEST4454973363.131.224.1192.168.2.11
                Jul 25, 2024 03:05:26.715184927 CEST49733445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:26.715323925 CEST49733445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:26.715385914 CEST49733445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:26.720854998 CEST4454973363.131.224.1192.168.2.11
                Jul 25, 2024 03:05:26.720865965 CEST4454973363.131.224.1192.168.2.11
                Jul 25, 2024 03:05:27.255553961 CEST44549981139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:27.255826950 CEST49981445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:27.255908966 CEST49981445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:27.255966902 CEST49981445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:27.262774944 CEST44549981139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:27.262794971 CEST44549981139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:27.491477013 CEST50010445192.168.2.1172.95.55.167
                Jul 25, 2024 03:05:27.496417999 CEST4455001072.95.55.167192.168.2.11
                Jul 25, 2024 03:05:27.496503115 CEST50010445192.168.2.1172.95.55.167
                Jul 25, 2024 03:05:27.496527910 CEST50010445192.168.2.1172.95.55.167
                Jul 25, 2024 03:05:27.496937990 CEST50011445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:27.501688957 CEST4455001172.95.55.1192.168.2.11
                Jul 25, 2024 03:05:27.501835108 CEST50011445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:27.501835108 CEST50011445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:27.502058983 CEST50012445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:27.502088070 CEST4455001072.95.55.167192.168.2.11
                Jul 25, 2024 03:05:27.502139091 CEST50010445192.168.2.1172.95.55.167
                Jul 25, 2024 03:05:27.506963015 CEST4455001272.95.55.1192.168.2.11
                Jul 25, 2024 03:05:27.507025957 CEST50012445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:27.507059097 CEST50012445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:27.507266045 CEST4455001172.95.55.1192.168.2.11
                Jul 25, 2024 03:05:27.507340908 CEST50011445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:27.511902094 CEST4455001272.95.55.1192.168.2.11
                Jul 25, 2024 03:05:27.725791931 CEST50014445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:27.730912924 CEST44550014210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:27.731060982 CEST50014445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:27.731134892 CEST50014445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:27.736215115 CEST44550014210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:28.522435904 CEST50015445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:28.527375937 CEST44550015202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:28.527467966 CEST50015445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:28.527514935 CEST50015445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:28.532283068 CEST44550015202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:28.756180048 CEST44549758158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:28.756262064 CEST49758445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:28.756316900 CEST49758445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:28.756375074 CEST49758445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:28.761307955 CEST44549758158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:28.761322021 CEST44549758158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:29.507122993 CEST50016445192.168.2.11157.92.67.217
                Jul 25, 2024 03:05:29.512130022 CEST44550016157.92.67.217192.168.2.11
                Jul 25, 2024 03:05:29.512248039 CEST50016445192.168.2.11157.92.67.217
                Jul 25, 2024 03:05:29.512443066 CEST50016445192.168.2.11157.92.67.217
                Jul 25, 2024 03:05:29.512445927 CEST50017445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:29.517263889 CEST44550017157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:29.517318964 CEST50017445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:29.517344952 CEST50017445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:29.517575979 CEST50018445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:29.518358946 CEST44550016157.92.67.217192.168.2.11
                Jul 25, 2024 03:05:29.518408060 CEST50016445192.168.2.11157.92.67.217
                Jul 25, 2024 03:05:29.523761988 CEST44550018157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:29.523824930 CEST50018445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:29.523854971 CEST50018445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:29.524220943 CEST44550017157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:29.524230957 CEST44550017157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:29.524271965 CEST50017445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:29.528671026 CEST44550018157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:29.725893974 CEST50019445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:29.730823994 CEST4455001963.131.224.1192.168.2.11
                Jul 25, 2024 03:05:29.730915070 CEST50019445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:29.730972052 CEST50019445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:29.735820055 CEST4455001963.131.224.1192.168.2.11
                Jul 25, 2024 03:05:30.256882906 CEST50020445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:30.261734009 CEST44550020139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:30.261821032 CEST50020445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:30.261976957 CEST50020445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:30.266707897 CEST44550020139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:30.572220087 CEST44550015202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:30.572323084 CEST50015445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:30.572360039 CEST50015445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:30.572396040 CEST50015445192.168.2.11202.46.46.1
                Jul 25, 2024 03:05:30.579073906 CEST44550015202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:30.579087019 CEST44550015202.46.46.1192.168.2.11
                Jul 25, 2024 03:05:30.636286974 CEST50021445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:30.641237020 CEST44550021202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:30.641423941 CEST50021445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:30.641423941 CEST50021445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:30.642049074 CEST50022445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:30.646868944 CEST44550022202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:30.646929026 CEST50022445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:30.646960020 CEST50022445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:30.646977901 CEST44550021202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:30.647062063 CEST50021445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:30.651905060 CEST44550022202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:30.787714958 CEST4454978348.239.46.1192.168.2.11
                Jul 25, 2024 03:05:30.787816048 CEST49783445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:30.795300961 CEST49783445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:30.795377016 CEST49783445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:30.800271034 CEST4454978348.239.46.1192.168.2.11
                Jul 25, 2024 03:05:30.800307035 CEST4454978348.239.46.1192.168.2.11
                Jul 25, 2024 03:05:31.522824049 CEST50023445192.168.2.1126.155.142.132
                Jul 25, 2024 03:05:31.527844906 CEST4455002326.155.142.132192.168.2.11
                Jul 25, 2024 03:05:31.527988911 CEST50023445192.168.2.1126.155.142.132
                Jul 25, 2024 03:05:31.528006077 CEST50023445192.168.2.1126.155.142.132
                Jul 25, 2024 03:05:31.528141022 CEST50024445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:31.532951117 CEST4455002426.155.142.1192.168.2.11
                Jul 25, 2024 03:05:31.533030033 CEST50024445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:31.533044100 CEST50024445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:31.533404112 CEST4455002326.155.142.132192.168.2.11
                Jul 25, 2024 03:05:31.533462048 CEST50023445192.168.2.1126.155.142.132
                Jul 25, 2024 03:05:31.533493996 CEST50025445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:31.538563013 CEST4455002526.155.142.1192.168.2.11
                Jul 25, 2024 03:05:31.538595915 CEST4455002426.155.142.1192.168.2.11
                Jul 25, 2024 03:05:31.538642883 CEST50025445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:31.538666964 CEST50024445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:31.538713932 CEST50025445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:31.543576956 CEST4455002526.155.142.1192.168.2.11
                Jul 25, 2024 03:05:31.757915974 CEST50026445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:31.763672113 CEST44550026158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:31.763756037 CEST50026445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:31.763814926 CEST50026445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:31.769179106 CEST44550026158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:32.382200956 CEST44550020139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:32.382328033 CEST50020445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:32.382360935 CEST50020445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:32.382402897 CEST50020445192.168.2.11139.162.58.2
                Jul 25, 2024 03:05:32.387104988 CEST44550020139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:32.387231112 CEST44550020139.162.58.2192.168.2.11
                Jul 25, 2024 03:05:32.445229053 CEST50027445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:32.450155020 CEST44550027139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:32.450233936 CEST50027445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:32.450265884 CEST50027445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:32.450637102 CEST50028445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:32.455495119 CEST44550028139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:32.455562115 CEST50028445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:32.455579042 CEST50028445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:32.455902100 CEST44550027139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:32.455960035 CEST50027445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:32.460586071 CEST44550028139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:33.538350105 CEST50029445192.168.2.1115.134.102.215
                Jul 25, 2024 03:05:33.544446945 CEST4455002915.134.102.215192.168.2.11
                Jul 25, 2024 03:05:33.544527054 CEST50029445192.168.2.1115.134.102.215
                Jul 25, 2024 03:05:33.544559002 CEST50029445192.168.2.1115.134.102.215
                Jul 25, 2024 03:05:33.544725895 CEST50030445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:33.551038980 CEST4455003015.134.102.1192.168.2.11
                Jul 25, 2024 03:05:33.551122904 CEST50030445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:33.551187992 CEST50030445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:33.551215887 CEST4455002915.134.102.215192.168.2.11
                Jul 25, 2024 03:05:33.551265001 CEST50029445192.168.2.1115.134.102.215
                Jul 25, 2024 03:05:33.551465034 CEST50031445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:33.558250904 CEST4455003115.134.102.1192.168.2.11
                Jul 25, 2024 03:05:33.558330059 CEST50031445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:33.558358908 CEST4455003015.134.102.1192.168.2.11
                Jul 25, 2024 03:05:33.558389902 CEST50031445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:33.558414936 CEST50030445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:33.564408064 CEST4455003115.134.102.1192.168.2.11
                Jul 25, 2024 03:05:33.803929090 CEST50032445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:33.808778048 CEST4455003248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:33.808906078 CEST50032445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:33.808971882 CEST50032445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:33.813657045 CEST4455003248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:34.548532009 CEST44550028139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:34.548652887 CEST50028445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:34.548705101 CEST50028445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:34.548749924 CEST50028445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:34.553812981 CEST44550028139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:34.553832054 CEST44550028139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:34.798279047 CEST44549833196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:34.798485041 CEST49833445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:34.798485994 CEST49833445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:34.798576117 CEST49833445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:34.803586960 CEST44549833196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:34.803599119 CEST44549833196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:35.592325926 CEST50033445192.168.2.111.0.209.114
                Jul 25, 2024 03:05:35.597218990 CEST445500331.0.209.114192.168.2.11
                Jul 25, 2024 03:05:35.597304106 CEST50033445192.168.2.111.0.209.114
                Jul 25, 2024 03:05:35.610426903 CEST50033445192.168.2.111.0.209.114
                Jul 25, 2024 03:05:35.610488892 CEST50034445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:35.615535975 CEST445500331.0.209.114192.168.2.11
                Jul 25, 2024 03:05:35.615611076 CEST50033445192.168.2.111.0.209.114
                Jul 25, 2024 03:05:35.616944075 CEST445500341.0.209.1192.168.2.11
                Jul 25, 2024 03:05:35.617018938 CEST50034445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:35.617167950 CEST50034445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:35.618813992 CEST50035445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:35.622571945 CEST445500341.0.209.1192.168.2.11
                Jul 25, 2024 03:05:35.622636080 CEST50034445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:35.623644114 CEST445500351.0.209.1192.168.2.11
                Jul 25, 2024 03:05:35.623703003 CEST50035445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:35.623769045 CEST50035445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:35.629251003 CEST445500351.0.209.1192.168.2.11
                Jul 25, 2024 03:05:36.816982031 CEST4454985690.50.189.1192.168.2.11
                Jul 25, 2024 03:05:36.817208052 CEST49856445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:36.817208052 CEST49856445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:36.817300081 CEST49856445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:36.822192907 CEST4454985690.50.189.1192.168.2.11
                Jul 25, 2024 03:05:36.822227001 CEST4454985690.50.189.1192.168.2.11
                Jul 25, 2024 03:05:37.553837061 CEST50036445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:37.560703039 CEST44550036139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:37.560817957 CEST50036445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:37.560873032 CEST50036445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:37.565815926 CEST44550036139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:37.604167938 CEST50037445192.168.2.11150.119.16.59
                Jul 25, 2024 03:05:37.609600067 CEST44550037150.119.16.59192.168.2.11
                Jul 25, 2024 03:05:37.609715939 CEST50037445192.168.2.11150.119.16.59
                Jul 25, 2024 03:05:37.609744072 CEST50037445192.168.2.11150.119.16.59
                Jul 25, 2024 03:05:37.609880924 CEST50038445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:37.620459080 CEST44550038150.119.16.1192.168.2.11
                Jul 25, 2024 03:05:37.620817900 CEST50038445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:37.620817900 CEST50038445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:37.621573925 CEST50039445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:37.624567032 CEST44550037150.119.16.59192.168.2.11
                Jul 25, 2024 03:05:37.624650955 CEST50037445192.168.2.11150.119.16.59
                Jul 25, 2024 03:05:37.626486063 CEST44550038150.119.16.1192.168.2.11
                Jul 25, 2024 03:05:37.626548052 CEST50038445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:37.626579046 CEST44550039150.119.16.1192.168.2.11
                Jul 25, 2024 03:05:37.626641035 CEST50039445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:37.626704931 CEST50039445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:37.631516933 CEST44550039150.119.16.1192.168.2.11
                Jul 25, 2024 03:05:37.807877064 CEST50040445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:37.813173056 CEST44550040196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:37.813252926 CEST50040445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:37.813318968 CEST50040445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:37.818464041 CEST44550040196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:39.171304941 CEST4454988687.253.190.2192.168.2.11
                Jul 25, 2024 03:05:39.171408892 CEST49886445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:39.171410084 CEST49886445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:39.171495914 CEST49886445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:39.178534031 CEST4454988687.253.190.2192.168.2.11
                Jul 25, 2024 03:05:39.178545952 CEST4454988687.253.190.2192.168.2.11
                Jul 25, 2024 03:05:39.475867033 CEST50041445192.168.2.1157.62.233.90
                Jul 25, 2024 03:05:39.480737925 CEST4455004157.62.233.90192.168.2.11
                Jul 25, 2024 03:05:39.480859041 CEST50041445192.168.2.1157.62.233.90
                Jul 25, 2024 03:05:39.480886936 CEST50041445192.168.2.1157.62.233.90
                Jul 25, 2024 03:05:39.481004000 CEST50042445192.168.2.1157.62.233.1
                Jul 25, 2024 03:05:39.485791922 CEST4455004257.62.233.1192.168.2.11
                Jul 25, 2024 03:05:39.485876083 CEST50042445192.168.2.1157.62.233.1
                Jul 25, 2024 03:05:39.485996008 CEST50042445192.168.2.1157.62.233.1
                Jul 25, 2024 03:05:39.486162901 CEST4455004157.62.233.90192.168.2.11
                Jul 25, 2024 03:05:39.486211061 CEST50041445192.168.2.1157.62.233.90
                Jul 25, 2024 03:05:39.486402035 CEST50043445192.168.2.1157.62.233.1
                Jul 25, 2024 03:05:39.491288900 CEST4455004257.62.233.1192.168.2.11
                Jul 25, 2024 03:05:39.491465092 CEST4455004257.62.233.1192.168.2.11
                Jul 25, 2024 03:05:39.491491079 CEST4455004357.62.233.1192.168.2.11
                Jul 25, 2024 03:05:39.491518021 CEST50042445192.168.2.1157.62.233.1
                Jul 25, 2024 03:05:39.491568089 CEST50043445192.168.2.1157.62.233.1
                Jul 25, 2024 03:05:39.491607904 CEST50043445192.168.2.1157.62.233.1
                Jul 25, 2024 03:05:39.496359110 CEST4455004357.62.233.1192.168.2.11
                Jul 25, 2024 03:05:39.704937935 CEST44550036139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:39.705120087 CEST50036445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:39.705156088 CEST50036445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:39.705156088 CEST50036445192.168.2.11139.162.58.3
                Jul 25, 2024 03:05:39.712393999 CEST44550036139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:39.712425947 CEST44550036139.162.58.3192.168.2.11
                Jul 25, 2024 03:05:39.756807089 CEST50044445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:39.769961119 CEST44550044139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:39.770039082 CEST50044445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:39.770129919 CEST50044445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:39.770488024 CEST50045445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:39.778388977 CEST44550045139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:39.778449059 CEST50045445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:39.778501034 CEST50045445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:39.779969931 CEST44550044139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:39.780028105 CEST50044445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:39.786192894 CEST44550045139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:39.819333076 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:39.830826044 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:05:39.830936909 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:39.830961943 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:05:39.839298964 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:05:41.225944042 CEST50047445192.168.2.1124.92.172.43
                Jul 25, 2024 03:05:41.288674116 CEST4455004724.92.172.43192.168.2.11
                Jul 25, 2024 03:05:41.288815022 CEST50047445192.168.2.1124.92.172.43
                Jul 25, 2024 03:05:41.288865089 CEST50047445192.168.2.1124.92.172.43
                Jul 25, 2024 03:05:41.289072990 CEST50048445192.168.2.1124.92.172.1
                Jul 25, 2024 03:05:41.295128107 CEST4455004824.92.172.1192.168.2.11
                Jul 25, 2024 03:05:41.295195103 CEST50048445192.168.2.1124.92.172.1
                Jul 25, 2024 03:05:41.295311928 CEST50048445192.168.2.1124.92.172.1
                Jul 25, 2024 03:05:41.295639038 CEST4455004724.92.172.43192.168.2.11
                Jul 25, 2024 03:05:41.295660019 CEST50049445192.168.2.1124.92.172.1
                Jul 25, 2024 03:05:41.295698881 CEST50047445192.168.2.1124.92.172.43
                Jul 25, 2024 03:05:41.301445961 CEST4455004924.92.172.1192.168.2.11
                Jul 25, 2024 03:05:41.301521063 CEST50049445192.168.2.1124.92.172.1
                Jul 25, 2024 03:05:41.301569939 CEST50049445192.168.2.1124.92.172.1
                Jul 25, 2024 03:05:41.303483009 CEST4455004824.92.172.1192.168.2.11
                Jul 25, 2024 03:05:41.303538084 CEST50048445192.168.2.1124.92.172.1
                Jul 25, 2024 03:05:41.312000990 CEST4455004924.92.172.1192.168.2.11
                Jul 25, 2024 03:05:41.356689930 CEST4454991356.26.26.1192.168.2.11
                Jul 25, 2024 03:05:41.356805086 CEST49913445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:41.356838942 CEST49913445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:41.356884956 CEST49913445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:41.362715006 CEST4454991356.26.26.1192.168.2.11
                Jul 25, 2024 03:05:41.362726927 CEST4454991356.26.26.1192.168.2.11
                Jul 25, 2024 03:05:41.858854055 CEST44550045139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:41.858979940 CEST50045445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:41.859020948 CEST50045445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:41.859067917 CEST50045445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:41.863750935 CEST44550045139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:41.863939047 CEST44550045139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:42.178731918 CEST50050445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:42.183625937 CEST4455005087.253.190.2192.168.2.11
                Jul 25, 2024 03:05:42.183860064 CEST50050445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:42.183860064 CEST50050445192.168.2.1187.253.190.2
                Jul 25, 2024 03:05:42.188951969 CEST4455005087.253.190.2192.168.2.11
                Jul 25, 2024 03:05:42.863128901 CEST44549938104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:42.863198996 CEST49938445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:42.863246918 CEST49938445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:42.863290071 CEST49938445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:42.866544962 CEST50051445192.168.2.1158.140.208.79
                Jul 25, 2024 03:05:42.868168116 CEST44549938104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:42.868220091 CEST44549938104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:42.871893883 CEST4455005158.140.208.79192.168.2.11
                Jul 25, 2024 03:05:42.872008085 CEST50051445192.168.2.1158.140.208.79
                Jul 25, 2024 03:05:42.872195959 CEST50051445192.168.2.1158.140.208.79
                Jul 25, 2024 03:05:42.872296095 CEST50052445192.168.2.1158.140.208.1
                Jul 25, 2024 03:05:42.878593922 CEST4455005258.140.208.1192.168.2.11
                Jul 25, 2024 03:05:42.878698111 CEST50052445192.168.2.1158.140.208.1
                Jul 25, 2024 03:05:42.878770113 CEST50052445192.168.2.1158.140.208.1
                Jul 25, 2024 03:05:42.879121065 CEST4455005158.140.208.79192.168.2.11
                Jul 25, 2024 03:05:42.879142046 CEST50053445192.168.2.1158.140.208.1
                Jul 25, 2024 03:05:42.879203081 CEST50051445192.168.2.1158.140.208.79
                Jul 25, 2024 03:05:42.884608030 CEST4455005358.140.208.1192.168.2.11
                Jul 25, 2024 03:05:42.884661913 CEST4455005258.140.208.1192.168.2.11
                Jul 25, 2024 03:05:42.884670973 CEST50053445192.168.2.1158.140.208.1
                Jul 25, 2024 03:05:42.884707928 CEST50052445192.168.2.1158.140.208.1
                Jul 25, 2024 03:05:42.884738922 CEST50053445192.168.2.1158.140.208.1
                Jul 25, 2024 03:05:42.890367031 CEST4455005358.140.208.1192.168.2.11
                Jul 25, 2024 03:05:44.366271973 CEST50054445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:44.371180058 CEST4455005456.26.26.1192.168.2.11
                Jul 25, 2024 03:05:44.371305943 CEST50054445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:44.371342897 CEST50054445192.168.2.1156.26.26.1
                Jul 25, 2024 03:05:44.376151085 CEST4455005456.26.26.1192.168.2.11
                Jul 25, 2024 03:05:44.397634029 CEST50055445192.168.2.1162.251.83.65
                Jul 25, 2024 03:05:44.403146982 CEST4455005562.251.83.65192.168.2.11
                Jul 25, 2024 03:05:44.403233051 CEST50055445192.168.2.1162.251.83.65
                Jul 25, 2024 03:05:44.403299093 CEST50055445192.168.2.1162.251.83.65
                Jul 25, 2024 03:05:44.403397083 CEST50056445192.168.2.1162.251.83.1
                Jul 25, 2024 03:05:44.408230066 CEST4455005662.251.83.1192.168.2.11
                Jul 25, 2024 03:05:44.408304930 CEST50056445192.168.2.1162.251.83.1
                Jul 25, 2024 03:05:44.408329010 CEST50056445192.168.2.1162.251.83.1
                Jul 25, 2024 03:05:44.408541918 CEST4455005562.251.83.65192.168.2.11
                Jul 25, 2024 03:05:44.408600092 CEST50055445192.168.2.1162.251.83.65
                Jul 25, 2024 03:05:44.408713102 CEST50057445192.168.2.1162.251.83.1
                Jul 25, 2024 03:05:44.413463116 CEST4455005662.251.83.1192.168.2.11
                Jul 25, 2024 03:05:44.413522959 CEST50056445192.168.2.1162.251.83.1
                Jul 25, 2024 03:05:44.413604975 CEST4455005762.251.83.1192.168.2.11
                Jul 25, 2024 03:05:44.413674116 CEST50057445192.168.2.1162.251.83.1
                Jul 25, 2024 03:05:44.413722038 CEST50057445192.168.2.1162.251.83.1
                Jul 25, 2024 03:05:44.418591976 CEST4455005762.251.83.1192.168.2.11
                Jul 25, 2024 03:05:44.866343975 CEST50058445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:44.871640921 CEST44550058139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:44.871783018 CEST50058445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:44.871783018 CEST50058445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:44.876678944 CEST44550058139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:45.824673891 CEST50059445192.168.2.11204.216.232.66
                Jul 25, 2024 03:05:45.866394043 CEST50060445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:46.645170927 CEST44550059204.216.232.66192.168.2.11
                Jul 25, 2024 03:05:46.645211935 CEST44550060104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:46.645432949 CEST50059445192.168.2.11204.216.232.66
                Jul 25, 2024 03:05:46.645488977 CEST50059445192.168.2.11204.216.232.66
                Jul 25, 2024 03:05:46.645494938 CEST50060445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:46.645575047 CEST50060445192.168.2.11104.140.149.1
                Jul 25, 2024 03:05:46.645775080 CEST50061445192.168.2.11204.216.232.1
                Jul 25, 2024 03:05:46.651884079 CEST44550060104.140.149.1192.168.2.11
                Jul 25, 2024 03:05:46.651915073 CEST44550061204.216.232.1192.168.2.11
                Jul 25, 2024 03:05:46.652003050 CEST50061445192.168.2.11204.216.232.1
                Jul 25, 2024 03:05:46.652215004 CEST50061445192.168.2.11204.216.232.1
                Jul 25, 2024 03:05:46.652502060 CEST50062445192.168.2.11204.216.232.1
                Jul 25, 2024 03:05:46.652848005 CEST44550059204.216.232.66192.168.2.11
                Jul 25, 2024 03:05:46.652918100 CEST50059445192.168.2.11204.216.232.66
                Jul 25, 2024 03:05:46.657499075 CEST44550062204.216.232.1192.168.2.11
                Jul 25, 2024 03:05:46.657530069 CEST44550061204.216.232.1192.168.2.11
                Jul 25, 2024 03:05:46.657586098 CEST50062445192.168.2.11204.216.232.1
                Jul 25, 2024 03:05:46.657608986 CEST50061445192.168.2.11204.216.232.1
                Jul 25, 2024 03:05:46.657900095 CEST50062445192.168.2.11204.216.232.1
                Jul 25, 2024 03:05:46.662728071 CEST44550062204.216.232.1192.168.2.11
                Jul 25, 2024 03:05:46.886481047 CEST44549987184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:46.886637926 CEST49987445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:46.886689901 CEST49987445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:46.886749029 CEST49987445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:46.892200947 CEST44549987184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:46.893415928 CEST44549987184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:46.952332020 CEST44550058139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:46.952455997 CEST50058445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:46.952493906 CEST50058445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:46.953001022 CEST50058445192.168.2.11139.162.58.4
                Jul 25, 2024 03:05:46.961822987 CEST44550058139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:46.963869095 CEST44550058139.162.58.4192.168.2.11
                Jul 25, 2024 03:05:47.007123947 CEST50063445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:47.015866995 CEST44550063139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:47.015974998 CEST50063445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:47.016040087 CEST50063445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:47.016395092 CEST50064445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:47.025083065 CEST44550064139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:47.025099039 CEST44550063139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:47.025207996 CEST50063445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:47.025234938 CEST50064445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:47.033674955 CEST44550064139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:47.147739887 CEST50065445192.168.2.11129.12.189.188
                Jul 25, 2024 03:05:47.152803898 CEST44550065129.12.189.188192.168.2.11
                Jul 25, 2024 03:05:47.152960062 CEST50065445192.168.2.11129.12.189.188
                Jul 25, 2024 03:05:47.152960062 CEST50065445192.168.2.11129.12.189.188
                Jul 25, 2024 03:05:47.153577089 CEST50066445192.168.2.11129.12.189.1
                Jul 25, 2024 03:05:47.158447981 CEST44550065129.12.189.188192.168.2.11
                Jul 25, 2024 03:05:47.158480883 CEST44550066129.12.189.1192.168.2.11
                Jul 25, 2024 03:05:47.158504009 CEST50065445192.168.2.11129.12.189.188
                Jul 25, 2024 03:05:47.158562899 CEST50066445192.168.2.11129.12.189.1
                Jul 25, 2024 03:05:47.158593893 CEST50066445192.168.2.11129.12.189.1
                Jul 25, 2024 03:05:47.158848047 CEST50067445192.168.2.11129.12.189.1
                Jul 25, 2024 03:05:47.163736105 CEST44550067129.12.189.1192.168.2.11
                Jul 25, 2024 03:05:47.163803101 CEST50067445192.168.2.11129.12.189.1
                Jul 25, 2024 03:05:47.163834095 CEST50067445192.168.2.11129.12.189.1
                Jul 25, 2024 03:05:47.164124012 CEST44550066129.12.189.1192.168.2.11
                Jul 25, 2024 03:05:47.164179087 CEST50066445192.168.2.11129.12.189.1
                Jul 25, 2024 03:05:47.168958902 CEST44550067129.12.189.1192.168.2.11
                Jul 25, 2024 03:05:48.383157015 CEST50068445192.168.2.1194.82.132.51
                Jul 25, 2024 03:05:48.388041019 CEST4455006894.82.132.51192.168.2.11
                Jul 25, 2024 03:05:48.388108015 CEST50068445192.168.2.1194.82.132.51
                Jul 25, 2024 03:05:48.388185024 CEST50068445192.168.2.1194.82.132.51
                Jul 25, 2024 03:05:48.388334990 CEST50069445192.168.2.1194.82.132.1
                Jul 25, 2024 03:05:48.393177032 CEST4455006994.82.132.1192.168.2.11
                Jul 25, 2024 03:05:48.393232107 CEST50069445192.168.2.1194.82.132.1
                Jul 25, 2024 03:05:48.393311024 CEST50069445192.168.2.1194.82.132.1
                Jul 25, 2024 03:05:48.393594980 CEST50070445192.168.2.1194.82.132.1
                Jul 25, 2024 03:05:48.393713951 CEST4455006894.82.132.51192.168.2.11
                Jul 25, 2024 03:05:48.393759012 CEST50068445192.168.2.1194.82.132.51
                Jul 25, 2024 03:05:48.398416996 CEST4455007094.82.132.1192.168.2.11
                Jul 25, 2024 03:05:48.398487091 CEST50070445192.168.2.1194.82.132.1
                Jul 25, 2024 03:05:48.398523092 CEST4455006994.82.132.1192.168.2.11
                Jul 25, 2024 03:05:48.398530006 CEST50070445192.168.2.1194.82.132.1
                Jul 25, 2024 03:05:48.398564100 CEST50069445192.168.2.1194.82.132.1
                Jul 25, 2024 03:05:48.403318882 CEST4455007094.82.132.1192.168.2.11
                Jul 25, 2024 03:05:48.918153048 CEST4455001272.95.55.1192.168.2.11
                Jul 25, 2024 03:05:48.918231964 CEST50012445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:48.918311119 CEST50012445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:48.918312073 CEST50012445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:48.923166037 CEST4455001272.95.55.1192.168.2.11
                Jul 25, 2024 03:05:48.923192978 CEST4455001272.95.55.1192.168.2.11
                Jul 25, 2024 03:05:49.113509893 CEST44550064139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:49.113575935 CEST50064445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:49.113610029 CEST50064445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:49.113673925 CEST50064445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:49.120642900 CEST44550064139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:49.120671988 CEST44550064139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:49.126211882 CEST44550014210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:49.126271963 CEST50014445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:49.126344919 CEST50014445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:49.126424074 CEST50014445192.168.2.11210.194.28.1
                Jul 25, 2024 03:05:49.131221056 CEST44550014210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:49.131365061 CEST44550014210.194.28.1192.168.2.11
                Jul 25, 2024 03:05:49.178778887 CEST50071445192.168.2.11210.194.28.2
                Jul 25, 2024 03:05:49.184089899 CEST44550071210.194.28.2192.168.2.11
                Jul 25, 2024 03:05:49.184174061 CEST50071445192.168.2.11210.194.28.2
                Jul 25, 2024 03:05:49.184202909 CEST50071445192.168.2.11210.194.28.2
                Jul 25, 2024 03:05:49.184541941 CEST50072445192.168.2.11210.194.28.2
                Jul 25, 2024 03:05:49.191698074 CEST44550072210.194.28.2192.168.2.11
                Jul 25, 2024 03:05:49.191869974 CEST50072445192.168.2.11210.194.28.2
                Jul 25, 2024 03:05:49.191936970 CEST50072445192.168.2.11210.194.28.2
                Jul 25, 2024 03:05:49.192958117 CEST44550071210.194.28.2192.168.2.11
                Jul 25, 2024 03:05:49.193013906 CEST50071445192.168.2.11210.194.28.2
                Jul 25, 2024 03:05:49.197005987 CEST44550072210.194.28.2192.168.2.11
                Jul 25, 2024 03:05:49.538785934 CEST50073445192.168.2.11192.240.220.214
                Jul 25, 2024 03:05:49.543864965 CEST44550073192.240.220.214192.168.2.11
                Jul 25, 2024 03:05:49.543965101 CEST50073445192.168.2.11192.240.220.214
                Jul 25, 2024 03:05:49.544003010 CEST50073445192.168.2.11192.240.220.214
                Jul 25, 2024 03:05:49.544140100 CEST50074445192.168.2.11192.240.220.1
                Jul 25, 2024 03:05:49.548932076 CEST44550074192.240.220.1192.168.2.11
                Jul 25, 2024 03:05:49.549010992 CEST50074445192.168.2.11192.240.220.1
                Jul 25, 2024 03:05:49.549086094 CEST50074445192.168.2.11192.240.220.1
                Jul 25, 2024 03:05:49.549438953 CEST50075445192.168.2.11192.240.220.1
                Jul 25, 2024 03:05:49.549644947 CEST44550073192.240.220.214192.168.2.11
                Jul 25, 2024 03:05:49.549715042 CEST50073445192.168.2.11192.240.220.214
                Jul 25, 2024 03:05:49.554294109 CEST44550075192.240.220.1192.168.2.11
                Jul 25, 2024 03:05:49.554364920 CEST50075445192.168.2.11192.240.220.1
                Jul 25, 2024 03:05:49.554423094 CEST50075445192.168.2.11192.240.220.1
                Jul 25, 2024 03:05:49.554532051 CEST44550074192.240.220.1192.168.2.11
                Jul 25, 2024 03:05:49.554589033 CEST50074445192.168.2.11192.240.220.1
                Jul 25, 2024 03:05:49.559231997 CEST44550075192.240.220.1192.168.2.11
                Jul 25, 2024 03:05:49.897494078 CEST50076445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:49.902458906 CEST44550076184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:49.902558088 CEST50076445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:49.902618885 CEST50076445192.168.2.11184.73.129.1
                Jul 25, 2024 03:05:49.907633066 CEST44550076184.73.129.1192.168.2.11
                Jul 25, 2024 03:05:50.616525888 CEST50077445192.168.2.1130.97.153.137
                Jul 25, 2024 03:05:50.622039080 CEST4455007730.97.153.137192.168.2.11
                Jul 25, 2024 03:05:50.622173071 CEST50077445192.168.2.1130.97.153.137
                Jul 25, 2024 03:05:50.622200012 CEST50077445192.168.2.1130.97.153.137
                Jul 25, 2024 03:05:50.622411966 CEST50078445192.168.2.1130.97.153.1
                Jul 25, 2024 03:05:50.629146099 CEST4455007830.97.153.1192.168.2.11
                Jul 25, 2024 03:05:50.629359961 CEST50078445192.168.2.1130.97.153.1
                Jul 25, 2024 03:05:50.629475117 CEST4455007730.97.153.137192.168.2.11
                Jul 25, 2024 03:05:50.629503965 CEST50078445192.168.2.1130.97.153.1
                Jul 25, 2024 03:05:50.629522085 CEST50077445192.168.2.1130.97.153.137
                Jul 25, 2024 03:05:50.629818916 CEST50079445192.168.2.1130.97.153.1
                Jul 25, 2024 03:05:50.634923935 CEST4455007830.97.153.1192.168.2.11
                Jul 25, 2024 03:05:50.634952068 CEST4455007930.97.153.1192.168.2.11
                Jul 25, 2024 03:05:50.635001898 CEST50078445192.168.2.1130.97.153.1
                Jul 25, 2024 03:05:50.635035038 CEST50079445192.168.2.1130.97.153.1
                Jul 25, 2024 03:05:50.635075092 CEST50079445192.168.2.1130.97.153.1
                Jul 25, 2024 03:05:50.640074015 CEST4455007930.97.153.1192.168.2.11
                Jul 25, 2024 03:05:50.923458099 CEST44550018157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:50.923551083 CEST50018445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:50.923588991 CEST50018445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:50.923635960 CEST50018445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:50.928400040 CEST44550018157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:50.928422928 CEST44550018157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:51.107362032 CEST4455001963.131.224.1192.168.2.11
                Jul 25, 2024 03:05:51.107438087 CEST50019445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:51.107506037 CEST50019445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:51.107589960 CEST50019445192.168.2.1163.131.224.1
                Jul 25, 2024 03:05:51.112360954 CEST4455001963.131.224.1192.168.2.11
                Jul 25, 2024 03:05:51.112422943 CEST4455001963.131.224.1192.168.2.11
                Jul 25, 2024 03:05:51.163379908 CEST50080445192.168.2.1163.131.224.2
                Jul 25, 2024 03:05:51.168905973 CEST4455008063.131.224.2192.168.2.11
                Jul 25, 2024 03:05:51.168977976 CEST50080445192.168.2.1163.131.224.2
                Jul 25, 2024 03:05:51.169100046 CEST50080445192.168.2.1163.131.224.2
                Jul 25, 2024 03:05:51.169708014 CEST50081445192.168.2.1163.131.224.2
                Jul 25, 2024 03:05:51.174922943 CEST4455008163.131.224.2192.168.2.11
                Jul 25, 2024 03:05:51.174987078 CEST50081445192.168.2.1163.131.224.2
                Jul 25, 2024 03:05:51.174993038 CEST4455008063.131.224.2192.168.2.11
                Jul 25, 2024 03:05:51.175055027 CEST50080445192.168.2.1163.131.224.2
                Jul 25, 2024 03:05:51.175223112 CEST50081445192.168.2.1163.131.224.2
                Jul 25, 2024 03:05:51.180090904 CEST4455008163.131.224.2192.168.2.11
                Jul 25, 2024 03:05:51.632132053 CEST50082445192.168.2.11193.191.213.98
                Jul 25, 2024 03:05:51.637222052 CEST44550082193.191.213.98192.168.2.11
                Jul 25, 2024 03:05:51.637343884 CEST50082445192.168.2.11193.191.213.98
                Jul 25, 2024 03:05:51.637424946 CEST50082445192.168.2.11193.191.213.98
                Jul 25, 2024 03:05:51.637769938 CEST50083445192.168.2.11193.191.213.1
                Jul 25, 2024 03:05:51.642615080 CEST44550083193.191.213.1192.168.2.11
                Jul 25, 2024 03:05:51.642678976 CEST50083445192.168.2.11193.191.213.1
                Jul 25, 2024 03:05:51.642739058 CEST50083445192.168.2.11193.191.213.1
                Jul 25, 2024 03:05:51.642961025 CEST50084445192.168.2.11193.191.213.1
                Jul 25, 2024 03:05:51.643062115 CEST44550082193.191.213.98192.168.2.11
                Jul 25, 2024 03:05:51.643116951 CEST50082445192.168.2.11193.191.213.98
                Jul 25, 2024 03:05:51.647972107 CEST44550084193.191.213.1192.168.2.11
                Jul 25, 2024 03:05:51.648053885 CEST50084445192.168.2.11193.191.213.1
                Jul 25, 2024 03:05:51.648067951 CEST50084445192.168.2.11193.191.213.1
                Jul 25, 2024 03:05:51.648116112 CEST44550083193.191.213.1192.168.2.11
                Jul 25, 2024 03:05:51.648170948 CEST50083445192.168.2.11193.191.213.1
                Jul 25, 2024 03:05:51.653132915 CEST44550084193.191.213.1192.168.2.11
                Jul 25, 2024 03:05:51.928929090 CEST50085445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:51.934695005 CEST4455008572.95.55.1192.168.2.11
                Jul 25, 2024 03:05:51.934832096 CEST50085445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:51.934921980 CEST50085445192.168.2.1172.95.55.1
                Jul 25, 2024 03:05:51.940694094 CEST4455008572.95.55.1192.168.2.11
                Jul 25, 2024 03:05:51.996124983 CEST44550022202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:51.996287107 CEST50022445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:51.996287107 CEST50022445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:51.996287107 CEST50022445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:52.001696110 CEST44550022202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:52.001749039 CEST44550022202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:52.116189003 CEST50086445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:52.121370077 CEST44550086139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:52.121490955 CEST50086445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:52.121490955 CEST50086445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:52.126451015 CEST44550086139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:52.569756031 CEST50087445192.168.2.11210.84.101.51
                Jul 25, 2024 03:05:52.574773073 CEST44550087210.84.101.51192.168.2.11
                Jul 25, 2024 03:05:52.574923038 CEST50087445192.168.2.11210.84.101.51
                Jul 25, 2024 03:05:52.574923038 CEST50087445192.168.2.11210.84.101.51
                Jul 25, 2024 03:05:52.575084925 CEST50088445192.168.2.11210.84.101.1
                Jul 25, 2024 03:05:52.579919100 CEST44550088210.84.101.1192.168.2.11
                Jul 25, 2024 03:05:52.579999924 CEST50088445192.168.2.11210.84.101.1
                Jul 25, 2024 03:05:52.580034971 CEST50088445192.168.2.11210.84.101.1
                Jul 25, 2024 03:05:52.580312967 CEST50089445192.168.2.11210.84.101.1
                Jul 25, 2024 03:05:52.580342054 CEST44550087210.84.101.51192.168.2.11
                Jul 25, 2024 03:05:52.580414057 CEST50087445192.168.2.11210.84.101.51
                Jul 25, 2024 03:05:52.585122108 CEST44550089210.84.101.1192.168.2.11
                Jul 25, 2024 03:05:52.585305929 CEST50089445192.168.2.11210.84.101.1
                Jul 25, 2024 03:05:52.585347891 CEST50089445192.168.2.11210.84.101.1
                Jul 25, 2024 03:05:52.585505009 CEST44550088210.84.101.1192.168.2.11
                Jul 25, 2024 03:05:52.585561037 CEST50088445192.168.2.11210.84.101.1
                Jul 25, 2024 03:05:52.590140104 CEST44550089210.84.101.1192.168.2.11
                Jul 25, 2024 03:05:52.926640034 CEST4455002526.155.142.1192.168.2.11
                Jul 25, 2024 03:05:52.926776886 CEST50025445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:52.926820040 CEST50025445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:52.926863909 CEST50025445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:52.935064077 CEST4455002526.155.142.1192.168.2.11
                Jul 25, 2024 03:05:52.935117006 CEST4455002526.155.142.1192.168.2.11
                Jul 25, 2024 03:05:53.141231060 CEST44550026158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:53.141345024 CEST50026445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:53.141424894 CEST50026445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:53.141504049 CEST50026445192.168.2.11158.15.154.1
                Jul 25, 2024 03:05:53.147737026 CEST44550026158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:53.147787094 CEST44550026158.15.154.1192.168.2.11
                Jul 25, 2024 03:05:53.194456100 CEST50090445192.168.2.11158.15.154.2
                Jul 25, 2024 03:05:53.200537920 CEST44550090158.15.154.2192.168.2.11
                Jul 25, 2024 03:05:53.200602055 CEST50090445192.168.2.11158.15.154.2
                Jul 25, 2024 03:05:53.200644016 CEST50090445192.168.2.11158.15.154.2
                Jul 25, 2024 03:05:53.201023102 CEST50091445192.168.2.11158.15.154.2
                Jul 25, 2024 03:05:53.205862045 CEST44550091158.15.154.2192.168.2.11
                Jul 25, 2024 03:05:53.205943108 CEST44550090158.15.154.2192.168.2.11
                Jul 25, 2024 03:05:53.205959082 CEST50091445192.168.2.11158.15.154.2
                Jul 25, 2024 03:05:53.205981016 CEST50091445192.168.2.11158.15.154.2
                Jul 25, 2024 03:05:53.206001043 CEST50090445192.168.2.11158.15.154.2
                Jul 25, 2024 03:05:53.212189913 CEST44550091158.15.154.2192.168.2.11
                Jul 25, 2024 03:05:53.455017090 CEST50092445192.168.2.11217.85.57.196
                Jul 25, 2024 03:05:53.464577913 CEST44550092217.85.57.196192.168.2.11
                Jul 25, 2024 03:05:53.464735985 CEST50092445192.168.2.11217.85.57.196
                Jul 25, 2024 03:05:53.464780092 CEST50092445192.168.2.11217.85.57.196
                Jul 25, 2024 03:05:53.464941978 CEST50093445192.168.2.11217.85.57.1
                Jul 25, 2024 03:05:53.474324942 CEST44550093217.85.57.1192.168.2.11
                Jul 25, 2024 03:05:53.474432945 CEST50093445192.168.2.11217.85.57.1
                Jul 25, 2024 03:05:53.474529028 CEST50093445192.168.2.11217.85.57.1
                Jul 25, 2024 03:05:53.474786043 CEST44550092217.85.57.196192.168.2.11
                Jul 25, 2024 03:05:53.474852085 CEST50092445192.168.2.11217.85.57.196
                Jul 25, 2024 03:05:53.474905014 CEST50094445192.168.2.11217.85.57.1
                Jul 25, 2024 03:05:53.483226061 CEST44550094217.85.57.1192.168.2.11
                Jul 25, 2024 03:05:53.483293056 CEST44550093217.85.57.1192.168.2.11
                Jul 25, 2024 03:05:53.483344078 CEST50094445192.168.2.11217.85.57.1
                Jul 25, 2024 03:05:53.483407021 CEST50094445192.168.2.11217.85.57.1
                Jul 25, 2024 03:05:53.483407021 CEST50093445192.168.2.11217.85.57.1
                Jul 25, 2024 03:05:53.488902092 CEST44550094217.85.57.1192.168.2.11
                Jul 25, 2024 03:05:53.929009914 CEST50095445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:53.933809996 CEST44550095157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:53.933923960 CEST50095445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:53.933923960 CEST50095445192.168.2.11157.92.67.1
                Jul 25, 2024 03:05:53.938733101 CEST44550095157.92.67.1192.168.2.11
                Jul 25, 2024 03:05:54.182446957 CEST44550086139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:54.182540894 CEST50086445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:54.182625055 CEST50086445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:54.182625055 CEST50086445192.168.2.11139.162.58.5
                Jul 25, 2024 03:05:54.187876940 CEST44550086139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:54.187930107 CEST44550086139.162.58.5192.168.2.11
                Jul 25, 2024 03:05:54.241724968 CEST50096445192.168.2.11139.162.58.6
                Jul 25, 2024 03:05:54.247323036 CEST44550096139.162.58.6192.168.2.11
                Jul 25, 2024 03:05:54.247538090 CEST50096445192.168.2.11139.162.58.6
                Jul 25, 2024 03:05:54.247538090 CEST50096445192.168.2.11139.162.58.6
                Jul 25, 2024 03:05:54.248023033 CEST50097445192.168.2.11139.162.58.6
                Jul 25, 2024 03:05:54.253143072 CEST44550097139.162.58.6192.168.2.11
                Jul 25, 2024 03:05:54.253237009 CEST44550096139.162.58.6192.168.2.11
                Jul 25, 2024 03:05:54.253317118 CEST50097445192.168.2.11139.162.58.6
                Jul 25, 2024 03:05:54.253317118 CEST50097445192.168.2.11139.162.58.6
                Jul 25, 2024 03:05:54.254000902 CEST50096445192.168.2.11139.162.58.6
                Jul 25, 2024 03:05:54.258121967 CEST44550097139.162.58.6192.168.2.11
                Jul 25, 2024 03:05:54.273499012 CEST50098445192.168.2.1180.174.132.167
                Jul 25, 2024 03:05:54.278330088 CEST4455009880.174.132.167192.168.2.11
                Jul 25, 2024 03:05:54.278456926 CEST50098445192.168.2.1180.174.132.167
                Jul 25, 2024 03:05:54.278456926 CEST50098445192.168.2.1180.174.132.167
                Jul 25, 2024 03:05:54.278594971 CEST50099445192.168.2.1180.174.132.1
                Jul 25, 2024 03:05:54.283576012 CEST4455009980.174.132.1192.168.2.11
                Jul 25, 2024 03:05:54.283714056 CEST50099445192.168.2.1180.174.132.1
                Jul 25, 2024 03:05:54.283860922 CEST50099445192.168.2.1180.174.132.1
                Jul 25, 2024 03:05:54.284176111 CEST50100445192.168.2.1180.174.132.1
                Jul 25, 2024 03:05:54.284909010 CEST4455009880.174.132.167192.168.2.11
                Jul 25, 2024 03:05:54.285428047 CEST50098445192.168.2.1180.174.132.167
                Jul 25, 2024 03:05:54.288999081 CEST4455010080.174.132.1192.168.2.11
                Jul 25, 2024 03:05:54.289112091 CEST50100445192.168.2.1180.174.132.1
                Jul 25, 2024 03:05:54.289148092 CEST50100445192.168.2.1180.174.132.1
                Jul 25, 2024 03:05:54.289453030 CEST4455009980.174.132.1192.168.2.11
                Jul 25, 2024 03:05:54.289526939 CEST50099445192.168.2.1180.174.132.1
                Jul 25, 2024 03:05:54.293951988 CEST4455010080.174.132.1192.168.2.11
                Jul 25, 2024 03:05:54.974620104 CEST4455003115.134.102.1192.168.2.11
                Jul 25, 2024 03:05:54.974853039 CEST50031445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:54.975130081 CEST50031445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:54.975259066 CEST50031445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:54.981406927 CEST4455003115.134.102.1192.168.2.11
                Jul 25, 2024 03:05:54.982423067 CEST4455003115.134.102.1192.168.2.11
                Jul 25, 2024 03:05:55.007531881 CEST50101445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:55.012622118 CEST44550101202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:55.012753963 CEST50101445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:55.012809992 CEST50101445192.168.2.11202.46.46.2
                Jul 25, 2024 03:05:55.017644882 CEST44550101202.46.46.2192.168.2.11
                Jul 25, 2024 03:05:55.038475990 CEST50102445192.168.2.1168.36.231.33
                Jul 25, 2024 03:05:55.043766975 CEST4455010268.36.231.33192.168.2.11
                Jul 25, 2024 03:05:55.043898106 CEST50102445192.168.2.1168.36.231.33
                Jul 25, 2024 03:05:55.043925047 CEST50102445192.168.2.1168.36.231.33
                Jul 25, 2024 03:05:55.044022083 CEST50103445192.168.2.1168.36.231.1
                Jul 25, 2024 03:05:55.049443007 CEST4455010268.36.231.33192.168.2.11
                Jul 25, 2024 03:05:55.049519062 CEST50102445192.168.2.1168.36.231.33
                Jul 25, 2024 03:05:55.049609900 CEST4455010368.36.231.1192.168.2.11
                Jul 25, 2024 03:05:55.049660921 CEST50103445192.168.2.1168.36.231.1
                Jul 25, 2024 03:05:55.049757957 CEST50103445192.168.2.1168.36.231.1
                Jul 25, 2024 03:05:55.050055981 CEST50104445192.168.2.1168.36.231.1
                Jul 25, 2024 03:05:55.056356907 CEST4455010368.36.231.1192.168.2.11
                Jul 25, 2024 03:05:55.056435108 CEST50103445192.168.2.1168.36.231.1
                Jul 25, 2024 03:05:55.057811022 CEST4455010468.36.231.1192.168.2.11
                Jul 25, 2024 03:05:55.057877064 CEST50104445192.168.2.1168.36.231.1
                Jul 25, 2024 03:05:55.057919025 CEST50104445192.168.2.1168.36.231.1
                Jul 25, 2024 03:05:55.063483953 CEST4455010468.36.231.1192.168.2.11
                Jul 25, 2024 03:05:55.203213930 CEST4455003248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:55.203416109 CEST50032445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:55.203522921 CEST50032445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:55.203592062 CEST50032445192.168.2.1148.239.46.1
                Jul 25, 2024 03:05:55.209027052 CEST4455003248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:55.209055901 CEST4455003248.239.46.1192.168.2.11
                Jul 25, 2024 03:05:55.257100105 CEST50105445192.168.2.1148.239.46.2
                Jul 25, 2024 03:05:55.262001038 CEST4455010548.239.46.2192.168.2.11
                Jul 25, 2024 03:05:55.262177944 CEST50105445192.168.2.1148.239.46.2
                Jul 25, 2024 03:05:55.262218952 CEST50105445192.168.2.1148.239.46.2
                Jul 25, 2024 03:05:55.262644053 CEST50106445192.168.2.1148.239.46.2
                Jul 25, 2024 03:05:55.268883944 CEST4455010648.239.46.2192.168.2.11
                Jul 25, 2024 03:05:55.268980026 CEST50106445192.168.2.1148.239.46.2
                Jul 25, 2024 03:05:55.269042969 CEST50106445192.168.2.1148.239.46.2
                Jul 25, 2024 03:05:55.269474983 CEST4455010548.239.46.2192.168.2.11
                Jul 25, 2024 03:05:55.269526005 CEST50105445192.168.2.1148.239.46.2
                Jul 25, 2024 03:05:55.273947001 CEST4455010648.239.46.2192.168.2.11
                Jul 25, 2024 03:05:55.928919077 CEST50108445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:55.933743954 CEST4455010826.155.142.1192.168.2.11
                Jul 25, 2024 03:05:55.933846951 CEST50108445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:55.933882952 CEST50108445192.168.2.1126.155.142.1
                Jul 25, 2024 03:05:55.938632965 CEST4455010826.155.142.1192.168.2.11
                Jul 25, 2024 03:05:57.021841049 CEST445500351.0.209.1192.168.2.11
                Jul 25, 2024 03:05:57.022073984 CEST50035445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:57.022284985 CEST50035445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:57.022341967 CEST50035445192.168.2.111.0.209.1
                Jul 25, 2024 03:05:57.029457092 CEST445500351.0.209.1192.168.2.11
                Jul 25, 2024 03:05:57.029473066 CEST445500351.0.209.1192.168.2.11
                Jul 25, 2024 03:05:57.975900888 CEST50114445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:57.980967999 CEST4455011415.134.102.1192.168.2.11
                Jul 25, 2024 03:05:57.981074095 CEST50114445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:57.981142044 CEST50114445192.168.2.1115.134.102.1
                Jul 25, 2024 03:05:57.986879110 CEST4455011415.134.102.1192.168.2.11
                Jul 25, 2024 03:05:58.305268049 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:58.305325985 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:58.305417061 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:58.305830002 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:58.305845976 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:58.981508017 CEST44550039150.119.16.1192.168.2.11
                Jul 25, 2024 03:05:58.981612921 CEST50039445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:58.981656075 CEST50039445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:58.981704950 CEST50039445192.168.2.11150.119.16.1
                Jul 25, 2024 03:05:58.986473083 CEST44550039150.119.16.1192.168.2.11
                Jul 25, 2024 03:05:58.986495972 CEST44550039150.119.16.1192.168.2.11
                Jul 25, 2024 03:05:58.993278027 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:58.993413925 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:58.996989965 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:58.997010946 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:58.997364044 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.003134012 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.044498920 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.248114109 CEST44550040196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:59.248178959 CEST50040445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:59.248249054 CEST50040445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:59.248322964 CEST50040445192.168.2.11196.52.62.1
                Jul 25, 2024 03:05:59.252988100 CEST44550040196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:59.253014088 CEST44550040196.52.62.1192.168.2.11
                Jul 25, 2024 03:05:59.259006977 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.259037971 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.259057999 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.259104013 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.259138107 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.259151936 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.259181023 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.261610985 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.261646032 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.261662006 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.261676073 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.261706114 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.261713982 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.261740923 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.262032032 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.262051105 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.262062073 CEST50118443192.168.2.1152.165.165.26
                Jul 25, 2024 03:05:59.262067080 CEST4435011852.165.165.26192.168.2.11
                Jul 25, 2024 03:05:59.303989887 CEST50126445192.168.2.11196.52.62.2
                Jul 25, 2024 03:05:59.308810949 CEST44550126196.52.62.2192.168.2.11
                Jul 25, 2024 03:05:59.308876991 CEST50126445192.168.2.11196.52.62.2
                Jul 25, 2024 03:05:59.308958054 CEST50126445192.168.2.11196.52.62.2
                Jul 25, 2024 03:05:59.309299946 CEST50127445192.168.2.11196.52.62.2
                Jul 25, 2024 03:05:59.314078093 CEST44550127196.52.62.2192.168.2.11
                Jul 25, 2024 03:05:59.314138889 CEST50127445192.168.2.11196.52.62.2
                Jul 25, 2024 03:05:59.314177036 CEST50127445192.168.2.11196.52.62.2
                Jul 25, 2024 03:05:59.314316034 CEST44550126196.52.62.2192.168.2.11
                Jul 25, 2024 03:05:59.314353943 CEST50126445192.168.2.11196.52.62.2
                Jul 25, 2024 03:05:59.319015026 CEST44550127196.52.62.2192.168.2.11
                Jul 25, 2024 03:06:00.038225889 CEST50132445192.168.2.111.0.209.1
                Jul 25, 2024 03:06:00.043965101 CEST445501321.0.209.1192.168.2.11
                Jul 25, 2024 03:06:00.044096947 CEST50132445192.168.2.111.0.209.1
                Jul 25, 2024 03:06:00.044096947 CEST50132445192.168.2.111.0.209.1
                Jul 25, 2024 03:06:00.048978090 CEST445501321.0.209.1192.168.2.11
                Jul 25, 2024 03:06:00.873511076 CEST4455004357.62.233.1192.168.2.11
                Jul 25, 2024 03:06:00.873657942 CEST50043445192.168.2.1157.62.233.1
                Jul 25, 2024 03:06:00.873749018 CEST50043445192.168.2.1157.62.233.1
                Jul 25, 2024 03:06:00.873749018 CEST50043445192.168.2.1157.62.233.1
                Jul 25, 2024 03:06:00.878997087 CEST4455004357.62.233.1192.168.2.11
                Jul 25, 2024 03:06:00.879014015 CEST4455004357.62.233.1192.168.2.11
                Jul 25, 2024 03:06:01.991323948 CEST50155445192.168.2.11150.119.16.1
                Jul 25, 2024 03:06:02.168260098 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.169219971 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.169337988 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:06:02.169367075 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:06:02.169428110 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:06:02.169827938 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.170129061 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:06:02.170864105 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.170943975 CEST50046445192.168.2.1190.50.189.1
                Jul 25, 2024 03:06:02.172734022 CEST44550155150.119.16.1192.168.2.11
                Jul 25, 2024 03:06:02.176193953 CEST50155445192.168.2.11150.119.16.1
                Jul 25, 2024 03:06:02.176193953 CEST50155445192.168.2.11150.119.16.1
                Jul 25, 2024 03:06:02.176624060 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.183365107 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.183387995 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.183398962 CEST4455004690.50.189.1192.168.2.11
                Jul 25, 2024 03:06:02.183415890 CEST44550155150.119.16.1192.168.2.11
                Jul 25, 2024 03:06:02.226774931 CEST50160445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:02.233933926 CEST4455016090.50.189.2192.168.2.11
                Jul 25, 2024 03:06:02.234016895 CEST50160445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:02.234158993 CEST50160445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:02.237864971 CEST50161445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:02.242206097 CEST4455016090.50.189.2192.168.2.11
                Jul 25, 2024 03:06:02.242275953 CEST50160445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:02.244323015 CEST4455016190.50.189.2192.168.2.11
                Jul 25, 2024 03:06:02.244426012 CEST50161445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:02.244426012 CEST50161445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:02.251852989 CEST4455016190.50.189.2192.168.2.11
                Jul 25, 2024 03:06:02.757038116 CEST4455004924.92.172.1192.168.2.11
                Jul 25, 2024 03:06:02.757164001 CEST50049445192.168.2.1124.92.172.1
                Jul 25, 2024 03:06:02.757242918 CEST50049445192.168.2.1124.92.172.1
                Jul 25, 2024 03:06:02.757262945 CEST50049445192.168.2.1124.92.172.1
                Jul 25, 2024 03:06:02.762087107 CEST4455004924.92.172.1192.168.2.11
                Jul 25, 2024 03:06:02.762100935 CEST4455004924.92.172.1192.168.2.11
                Jul 25, 2024 03:06:03.579961061 CEST4455005087.253.190.2192.168.2.11
                Jul 25, 2024 03:06:03.580106020 CEST50050445192.168.2.1187.253.190.2
                Jul 25, 2024 03:06:03.580152988 CEST50050445192.168.2.1187.253.190.2
                Jul 25, 2024 03:06:03.580180883 CEST50050445192.168.2.1187.253.190.2
                Jul 25, 2024 03:06:03.584908962 CEST4455005087.253.190.2192.168.2.11
                Jul 25, 2024 03:06:03.584945917 CEST4455005087.253.190.2192.168.2.11
                Jul 25, 2024 03:06:03.632093906 CEST50189445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:03.636975050 CEST4455018987.253.190.3192.168.2.11
                Jul 25, 2024 03:06:03.637085915 CEST50189445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:03.637099028 CEST50189445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:03.637413025 CEST50190445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:03.642321110 CEST4455019087.253.190.3192.168.2.11
                Jul 25, 2024 03:06:03.642395973 CEST50190445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:03.642443895 CEST50190445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:03.643527031 CEST4455018987.253.190.3192.168.2.11
                Jul 25, 2024 03:06:03.643580914 CEST50189445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:03.647438049 CEST4455019087.253.190.3192.168.2.11
                Jul 25, 2024 03:06:03.882013083 CEST50197445192.168.2.1157.62.233.1
                Jul 25, 2024 03:06:04.104351997 CEST4455019757.62.233.1192.168.2.11
                Jul 25, 2024 03:06:04.104502916 CEST50197445192.168.2.1157.62.233.1
                Jul 25, 2024 03:06:04.104549885 CEST50197445192.168.2.1157.62.233.1
                Jul 25, 2024 03:06:04.109353065 CEST4455019757.62.233.1192.168.2.11
                Jul 25, 2024 03:06:04.304212093 CEST4455005358.140.208.1192.168.2.11
                Jul 25, 2024 03:06:04.304286957 CEST50053445192.168.2.1158.140.208.1
                Jul 25, 2024 03:06:04.304331064 CEST50053445192.168.2.1158.140.208.1
                Jul 25, 2024 03:06:04.304389954 CEST50053445192.168.2.1158.140.208.1
                Jul 25, 2024 03:06:04.309148073 CEST4455005358.140.208.1192.168.2.11
                Jul 25, 2024 03:06:04.309159994 CEST4455005358.140.208.1192.168.2.11
                Jul 25, 2024 03:06:05.750467062 CEST4455005456.26.26.1192.168.2.11
                Jul 25, 2024 03:06:05.750561953 CEST50054445192.168.2.1156.26.26.1
                Jul 25, 2024 03:06:05.750603914 CEST50054445192.168.2.1156.26.26.1
                Jul 25, 2024 03:06:05.750619888 CEST50054445192.168.2.1156.26.26.1
                Jul 25, 2024 03:06:05.755445957 CEST4455005456.26.26.1192.168.2.11
                Jul 25, 2024 03:06:05.755470037 CEST4455005456.26.26.1192.168.2.11
                Jul 25, 2024 03:06:05.772530079 CEST50265445192.168.2.1124.92.172.1
                Jul 25, 2024 03:06:05.783874989 CEST4455026524.92.172.1192.168.2.11
                Jul 25, 2024 03:06:05.783972979 CEST50265445192.168.2.1124.92.172.1
                Jul 25, 2024 03:06:05.783989906 CEST50265445192.168.2.1124.92.172.1
                Jul 25, 2024 03:06:05.784740925 CEST4455005762.251.83.1192.168.2.11
                Jul 25, 2024 03:06:05.784801960 CEST50057445192.168.2.1162.251.83.1
                Jul 25, 2024 03:06:05.784821033 CEST50057445192.168.2.1162.251.83.1
                Jul 25, 2024 03:06:05.784859896 CEST50057445192.168.2.1162.251.83.1
                Jul 25, 2024 03:06:05.789113998 CEST4455026524.92.172.1192.168.2.11
                Jul 25, 2024 03:06:05.790096998 CEST4455005762.251.83.1192.168.2.11
                Jul 25, 2024 03:06:05.790107012 CEST4455005762.251.83.1192.168.2.11
                Jul 25, 2024 03:06:05.803776979 CEST50270445192.168.2.1156.26.26.2
                Jul 25, 2024 03:06:05.808593988 CEST4455027056.26.26.2192.168.2.11
                Jul 25, 2024 03:06:05.808710098 CEST50270445192.168.2.1156.26.26.2
                Jul 25, 2024 03:06:05.808806896 CEST50270445192.168.2.1156.26.26.2
                Jul 25, 2024 03:06:05.809127092 CEST50271445192.168.2.1156.26.26.2
                Jul 25, 2024 03:06:05.814093113 CEST4455027156.26.26.2192.168.2.11
                Jul 25, 2024 03:06:05.814102888 CEST4455027056.26.26.2192.168.2.11
                Jul 25, 2024 03:06:05.814177990 CEST50270445192.168.2.1156.26.26.2
                Jul 25, 2024 03:06:05.814192057 CEST50271445192.168.2.1156.26.26.2
                Jul 25, 2024 03:06:05.814265013 CEST50271445192.168.2.1156.26.26.2
                Jul 25, 2024 03:06:05.818980932 CEST4455027156.26.26.2192.168.2.11
                Jul 25, 2024 03:06:07.796011925 CEST50190445192.168.2.1187.253.190.3
                Jul 25, 2024 03:06:07.796039104 CEST50091445192.168.2.11158.15.154.2
                Jul 25, 2024 03:06:07.796087027 CEST50101445192.168.2.11202.46.46.2
                Jul 25, 2024 03:06:07.796205044 CEST50106445192.168.2.1148.239.46.2
                Jul 25, 2024 03:06:07.796228886 CEST50072445192.168.2.11210.194.28.2
                Jul 25, 2024 03:06:07.796230078 CEST50060445192.168.2.11104.140.149.1
                Jul 25, 2024 03:06:07.796262980 CEST50127445192.168.2.11196.52.62.2
                Jul 25, 2024 03:06:07.796278954 CEST50081445192.168.2.1163.131.224.2
                Jul 25, 2024 03:06:07.796323061 CEST50062445192.168.2.11204.216.232.1
                Jul 25, 2024 03:06:07.796323061 CEST50067445192.168.2.11129.12.189.1
                Jul 25, 2024 03:06:07.796358109 CEST50070445192.168.2.1194.82.132.1
                Jul 25, 2024 03:06:07.796370029 CEST50075445192.168.2.11192.240.220.1
                Jul 25, 2024 03:06:07.796389103 CEST50076445192.168.2.11184.73.129.1
                Jul 25, 2024 03:06:07.796406984 CEST50079445192.168.2.1130.97.153.1
                Jul 25, 2024 03:06:07.796431065 CEST50084445192.168.2.11193.191.213.1
                Jul 25, 2024 03:06:07.796457052 CEST50085445192.168.2.1172.95.55.1
                Jul 25, 2024 03:06:07.796467066 CEST50089445192.168.2.11210.84.101.1
                Jul 25, 2024 03:06:07.796528101 CEST50097445192.168.2.11139.162.58.6
                Jul 25, 2024 03:06:07.796533108 CEST50094445192.168.2.11217.85.57.1
                Jul 25, 2024 03:06:07.796574116 CEST50104445192.168.2.1168.36.231.1
                Jul 25, 2024 03:06:07.796613932 CEST50108445192.168.2.1126.155.142.1
                Jul 25, 2024 03:06:07.796627045 CEST50114445192.168.2.1115.134.102.1
                Jul 25, 2024 03:06:07.796652079 CEST50132445192.168.2.111.0.209.1
                Jul 25, 2024 03:06:07.796684027 CEST50095445192.168.2.11157.92.67.1
                Jul 25, 2024 03:06:07.796684027 CEST50100445192.168.2.1180.174.132.1
                Jul 25, 2024 03:06:07.796684027 CEST50155445192.168.2.11150.119.16.1
                Jul 25, 2024 03:06:07.796740055 CEST50197445192.168.2.1157.62.233.1
                Jul 25, 2024 03:06:07.796765089 CEST50161445192.168.2.1190.50.189.2
                Jul 25, 2024 03:06:07.796859026 CEST50265445192.168.2.1124.92.172.1
                Jul 25, 2024 03:06:07.796972036 CEST50271445192.168.2.1156.26.26.2
                TimestampSource PortDest PortSource IPDest IP
                Jul 25, 2024 03:05:01.754725933 CEST6423653192.168.2.111.1.1.1
                Jul 25, 2024 03:05:01.763159037 CEST53642361.1.1.1192.168.2.11
                Jul 25, 2024 03:05:58.288953066 CEST138138192.168.2.11192.168.2.255
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jul 25, 2024 03:05:01.754725933 CEST192.168.2.111.1.1.10x5159Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jul 25, 2024 03:05:01.763159037 CEST1.1.1.1192.168.2.110x5159No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                Jul 25, 2024 03:05:01.763159037 CEST1.1.1.1192.168.2.110x5159No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                • slscr.update.microsoft.com
                • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.1149704104.16.167.228807600C:\Users\user\Desktop\LisectAVT_2403002A_26.exe
                TimestampBytes transferredDirectionData
                Jul 25, 2024 03:05:01.774465084 CEST100OUTGET / HTTP/1.1
                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Cache-Control: no-cache
                Jul 25, 2024 03:05:02.317466974 CEST778INHTTP/1.1 200 OK
                Date: Thu, 25 Jul 2024 01:05:02 GMT
                Content-Type: text/html
                Content-Length: 607
                Connection: close
                Server: cloudflare
                CF-RAY: 8a883d44ba7f7d1c-EWR
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.1149705104.16.167.228807980C:\Users\user\Desktop\LisectAVT_2403002A_26.exe
                TimestampBytes transferredDirectionData
                Jul 25, 2024 03:05:02.766397953 CEST100OUTGET / HTTP/1.1
                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Cache-Control: no-cache
                Jul 25, 2024 03:05:03.247416019 CEST778INHTTP/1.1 200 OK
                Date: Thu, 25 Jul 2024 01:05:03 GMT
                Content-Type: text/html
                Content-Length: 607
                Connection: close
                Server: cloudflare
                CF-RAY: 8a883d4adb6a43b1-EWR
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.114989652.165.165.26443
                TimestampBytes transferredDirectionData
                2024-07-25 01:05:20 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=l+uax9tLW5uZ1WT&MD=MVy5HlLL HTTP/1.1
                Connection: Keep-Alive
                Accept: */*
                User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                Host: slscr.update.microsoft.com
                2024-07-25 01:05:21 UTC560INHTTP/1.1 200 OK
                Cache-Control: no-cache
                Pragma: no-cache
                Content-Type: application/octet-stream
                Expires: -1
                Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                MS-CorrelationId: 4fac9600-fbda-4fba-97b7-29a1f4181743
                MS-RequestId: 5aa1a148-95fc-4268-a9ce-b93074b31f35
                MS-CV: NfJt4xwAvEWPI85N.0
                X-Microsoft-SLSClientCache: 2880
                Content-Disposition: attachment; filename=environment.cab
                X-Content-Type-Options: nosniff
                Date: Thu, 25 Jul 2024 01:05:20 GMT
                Connection: close
                Content-Length: 24490
                2024-07-25 01:05:21 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                2024-07-25 01:05:21 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.115011852.165.165.26443
                TimestampBytes transferredDirectionData
                2024-07-25 01:05:58 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=l+uax9tLW5uZ1WT&MD=MVy5HlLL HTTP/1.1
                Connection: Keep-Alive
                Accept: */*
                User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                Host: slscr.update.microsoft.com
                2024-07-25 01:05:59 UTC560INHTTP/1.1 200 OK
                Cache-Control: no-cache
                Pragma: no-cache
                Content-Type: application/octet-stream
                Expires: -1
                Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                MS-CorrelationId: 713f042e-74ee-4dc8-b7a4-41bd0fb33a60
                MS-RequestId: ff72e1a1-8821-4bfe-8d7d-1f4041d46f5f
                MS-CV: egmsDm5nAEqoJjjs.0
                X-Microsoft-SLSClientCache: 1440
                Content-Disposition: attachment; filename=environment.cab
                X-Content-Type-Options: nosniff
                Date: Thu, 25 Jul 2024 01:05:58 GMT
                Connection: close
                Content-Length: 30005
                2024-07-25 01:05:59 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                2024-07-25 01:05:59 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:21:04:59
                Start date:24/07/2024
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                Imagebase:0x7ff68dea0000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:1
                Start time:21:04:59
                Start date:24/07/2024
                Path:C:\Windows\System32\SgrmBroker.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\SgrmBroker.exe
                Imagebase:0x7ff620220000
                File size:329'504 bytes
                MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:2
                Start time:21:04:59
                Start date:24/07/2024
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                Imagebase:0x7ff68dea0000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:3
                Start time:21:04:59
                Start date:24/07/2024
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                Imagebase:0x7ff68dea0000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:4
                Start time:21:04:59
                Start date:24/07/2024
                Path:C:\Users\user\Desktop\LisectAVT_2403002A_26.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_26.exe"
                Imagebase:0x400000
                File size:3'723'271 bytes
                MD5 hash:EB4F4C455604F0F1CE111FBEFECD9E21
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000000.1276459985.000000000040F000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000000.1276607451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000004.00000000.1276607451.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                Reputation:low
                Has exited:true

                Target ID:7
                Start time:21:04:59
                Start date:24/07/2024
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                Imagebase:0x7ff68dea0000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:8
                Start time:21:04:59
                Start date:24/07/2024
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                Imagebase:0x7ff68dea0000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:9
                Start time:21:05:01
                Start date:24/07/2024
                Path:C:\Users\user\Desktop\LisectAVT_2403002A_26.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\LisectAVT_2403002A_26.exe -m security
                Imagebase:0x400000
                File size:3'723'271 bytes
                MD5 hash:EB4F4C455604F0F1CE111FBEFECD9E21
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1936681471.0000000002286000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1936681471.0000000002286000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1935230575.000000000042E000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1291190176.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1291190176.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1291005843.000000000040F000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmp, Author: us-cert code analysis team
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1936364904.0000000001D5D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1936364904.0000000001D5D000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                Reputation:low
                Has exited:true

                Target ID:10
                Start time:21:05:02
                Start date:24/07/2024
                Path:C:\Windows\tasksche.exe
                Wow64 process (32bit):false
                Commandline:C:\WINDOWS\tasksche.exe /i
                Imagebase:0x400000
                File size:3'514'368 bytes
                MD5 hash:3DF2667EF94776EEB272A1404801F118
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1300769671.000000000040E000.00000008.00000001.01000000.00000006.sdmp, Author: us-cert code analysis team
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmp, Author: us-cert code analysis team
                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                • Detection: 97%, ReversingLabs
                Reputation:low
                Has exited:true

                Target ID:12
                Start time:21:05:46
                Start date:24/07/2024
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                Imagebase:0x7ff68dea0000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:13
                Start time:21:06:00
                Start date:24/07/2024
                Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                Imagebase:0x7ff645940000
                File size:468'120 bytes
                MD5 hash:B3676839B2EE96983F9ED735CD044159
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:14
                Start time:21:06:00
                Start date:24/07/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff68cce0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:71.8%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:64.9%
                  Total number of Nodes:37
                  Total number of Limit Nodes:9

                  Callgraph

                  Control-flow Graph

                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F3A0EF0,?,00000000), ref: 00407CEF
                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                  • sprintf.MSVCRT ref: 00407E01
                  • sprintf.MSVCRT ref: 00407E18
                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                  • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                  • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00407E68
                  • CreateProcessA.KERNELBASE ref: 00407EE8
                  • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                  • CloseHandle.KERNEL32(08000000), ref: 00407F02
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.1301965645.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000004.00000002.1301947144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1301985566.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302080761.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProcResource$CloseFileHandle$CreateFindsprintf$ChangeLoadLockModuleMoveNotificationProcessSizeofWrite
                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                  • API String ID: 1541710770-1507730452
                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.1301965645.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000004.00000002.1301947144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1301985566.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302080761.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                  • String ID:
                  • API String ID: 801014965-0
                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                  Control-flow Graph

                  APIs
                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                  Strings
                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                  Memory Dump Source
                  • Source File: 00000004.00000002.1301965645.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000004.00000002.1301947144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1301985566.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302080761.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                  • API String ID: 774561529-2942426231
                  • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                  • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                  • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                  • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                  Control-flow Graph

                  APIs
                  • sprintf.MSVCRT ref: 00407C56
                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F3A0EF0,00000000), ref: 00407C9B
                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.1301965645.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000004.00000002.1301947144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1301985566.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302080761.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                  • API String ID: 3340711343-4063779371
                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                  Control-flow Graph

                  APIs
                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                  • __p___argc.MSVCRT ref: 004080A5
                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F3A0EF0,00000000,?,004081B2), ref: 004080DC
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.1301965645.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000004.00000002.1301947144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1301985566.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302016386.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302080761.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.1302206488.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                  • String ID: mssecsvc2.0
                  • API String ID: 4274534310-3729025388
                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                  Execution Graph

                  Execution Coverage:34.9%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:0%
                  Total number of Nodes:35
                  Total number of Limit Nodes:2

                  Callgraph

                  Control-flow Graph

                  APIs
                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                  • __p___argc.MSVCRT ref: 004080A5
                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F3A0EF0,00000000,?,004081B2), ref: 004080DC
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                  Strings
                  Memory Dump Source
                  • Source File: 00000009.00000002.1935141737.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000009.00000002.1935119591.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935162980.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935230575.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935251679.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935271996.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_9_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                  • String ID: mssecsvc2.0
                  • API String ID: 4274534310-3729025388
                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                  Control-flow Graph

                  APIs
                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                  Strings
                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                  Memory Dump Source
                  • Source File: 00000009.00000002.1935141737.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000009.00000002.1935119591.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935162980.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935230575.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935251679.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935271996.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_9_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                  • API String ID: 774561529-2942426231
                  • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                  • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                  • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                  • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                  Control-flow Graph

                  APIs
                  • sprintf.MSVCRT ref: 00407C56
                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F3A0EF0,00000000), ref: 00407C9B
                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                  Strings
                  Memory Dump Source
                  • Source File: 00000009.00000002.1935141737.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000009.00000002.1935119591.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935162980.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935230575.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935251679.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935271996.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_9_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                  • API String ID: 3340711343-4063779371
                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F3A0EF0,?,00000000), ref: 00407CEF
                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                  • sprintf.MSVCRT ref: 00407E01
                  • sprintf.MSVCRT ref: 00407E18
                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                  Strings
                  Memory Dump Source
                  • Source File: 00000009.00000002.1935141737.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000009.00000002.1935119591.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935162980.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935230575.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935251679.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935271996.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_9_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                  • API String ID: 4072214828-1507730452
                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000009.00000002.1935141737.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000009.00000002.1935119591.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935162980.000000000040A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935183043.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935230575.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935251679.000000000042F000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935271996.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.00000000007CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000009.00000002.1935370484.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_9_2_400000_LisectAVT_2403002A_26.jbxd
                  Yara matches
                  Similarity
                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                  • String ID:
                  • API String ID: 801014965-0
                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                  APIs
                  • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: memcpy
                  • String ID: /../$/..\$\../$\..\
                  • API String ID: 3510742995-3885502717
                  • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                  • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                  • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                  • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                  APIs
                  • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                  • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                  • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                  • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                  • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                  • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                  • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$LibraryLoad
                  • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                  • API String ID: 2238633743-2459060434
                  • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                  • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                  • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                  • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                  APIs
                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                  • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandleOpen$ManagerStart
                  • String ID: cmd.exe /c "%s"
                  • API String ID: 1485051382-955883872
                  • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                  • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                  • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                  • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                  APIs
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                  • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                  • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ??0exception@@ExceptionThrow$memcpy
                  • String ID:
                  • API String ID: 1881450474-3916222277
                  • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                  • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                  • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                  • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                  APIs
                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                  • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                  • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                  • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                  • String ID: WANACRY!
                  • API String ID: 283026544-1240840912
                  • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                  • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                  • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                  • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                  APIs
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ??0exception@@ExceptionThrowmemcpy
                  • String ID: $Q;@
                  • API String ID: 2382887404-262343263
                  • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                  • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                  • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                  • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                  APIs
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ??0exception@@ExceptionThrowmemcpy
                  • String ID:
                  • API String ID: 2382887404-3916222277
                  • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                  • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                  • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                  • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                  APIs
                  • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: Heap$FreeProcessfree
                  • String ID:
                  • API String ID: 3428986607-0
                  • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                  • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                  • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                  • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                  APIs
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ??0exception@@ExceptionThrow
                  • String ID:
                  • API String ID: 941485209-0
                  • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                  • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                  • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                  • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                  APIs
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ??0exception@@ExceptionThrow
                  • String ID:
                  • API String ID: 941485209-0
                  • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                  • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                  • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                  • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: memcpy
                  • String ID:
                  • API String ID: 3510742995-0
                  • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                  • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                  • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                  • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                  APIs
                  • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ContextCryptRelease
                  • String ID:
                  • API String ID: 829835001-0
                  • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                  • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                  • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                  • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                  • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                  • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                  • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                  • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                  • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                  • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                  APIs
                    • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                  • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                  • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                  • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                  • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                  • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$LibraryLoad
                  • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                  • API String ID: 2238633743-1294736154
                  • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                  • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                  • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                  • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: %s%s$%s%s%s$:$\
                  • API String ID: 0-1100577047
                  • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                  • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                  • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                  • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                  APIs
                  • __p___argv.MSVCRT(0040F538), ref: 00402040
                  • strcmp.MSVCRT(?), ref: 0040204B
                  • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                  • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                    • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                  • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                  • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                  • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                    • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                    • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                    • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                    • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                  • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                  • API String ID: 1074704982-2844324180
                  • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                  • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                  • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                  • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                  APIs
                  • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                  • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                  • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                  • strlen.MSVCRT(?), ref: 004011A7
                  • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                  • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                  • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                  • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                  • String ID: 0@$Software\$WanaCrypt0r
                  • API String ID: 865909632-3421300005
                  • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                  • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                  • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                  • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                  • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                  • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                  • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                  • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                  • String ID: %s\Intel$%s\ProgramData
                  • API String ID: 3806094219-198707228
                  • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                  • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                  • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                  • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                  APIs
                    • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                  • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                  • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                  • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                    • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                  • SetLastError.KERNEL32(0000045A), ref: 00402430
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                  • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                  • API String ID: 1900561814-3657104962
                  • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                  • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                  • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                  • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                  APIs
                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                  • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                  • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: Directory$AttributesCreateCurrentFile$swprintf
                  • String ID: %s\%s
                  • API String ID: 1036847564-4073750446
                  • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                  • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                  • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                  • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                  APIs
                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                  • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                  • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                  • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                  • CloseHandle.KERNEL32(?), ref: 004010EC
                  • CloseHandle.KERNEL32(?), ref: 004010F1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                  • String ID: D
                  • API String ID: 786732093-2746444292
                  • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                  • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                  • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                  • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                  APIs
                  • __set_app_type.MSVCRT(00000002), ref: 004077E7
                  • __p__fmode.MSVCRT ref: 004077FC
                  • __p__commode.MSVCRT ref: 0040780A
                  • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                  • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                  • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                  • String ID:
                  • API String ID: 3626615345-0
                  • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                  • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                  • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                  • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                  APIs
                  • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                    • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                  • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                  • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                  • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                  • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                  • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                  • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                  • String ID:
                  • API String ID: 2141228402-0
                  • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                  • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                  • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                  • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                  APIs
                  • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                  • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                  • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: Read$realloc
                  • String ID: ?!@
                  • API String ID: 1241503663-708128716
                  • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                  • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                  • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                  • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                  APIs
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: rand$wcslen$ComputerNamesrand
                  • String ID:
                  • API String ID: 3058258771-0
                  • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                  • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                  • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                  • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                  APIs
                  • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                  • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                  • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                  • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                  • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                  • String ID:
                  • API String ID: 2935503933-0
                  • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                  • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                  • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                  • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                  APIs
                  • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                  • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                  • Sleep.KERNEL32(000003E8), ref: 00401F40
                  • CloseHandle.KERNEL32(00000000), ref: 00401F52
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandleMutexOpenSleepsprintf
                  • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                  • API String ID: 2780352083-2959021817
                  • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                  • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                  • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                  • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                  APIs
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ??0exception@@ExceptionThrowmemcpy
                  • String ID:
                  • API String ID: 2382887404-0
                  • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                  • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                  • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                  • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                  APIs
                  • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                  • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                  • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                  • fclose.MSVCRT(00000000), ref: 00401058
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: fclosefopenfreadfwrite
                  • String ID: c.wnry
                  • API String ID: 4000964834-3240288721
                  • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                  • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                  • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                  • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                  APIs
                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                  • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                  • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                  • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                  • String ID:
                  • API String ID: 2811923685-0
                  • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                  • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                  • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                  • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                  APIs
                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                  • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Pointer$??2@Create
                  • String ID:
                  • API String ID: 1331958074-0
                  • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                  • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                  • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                  • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                  APIs
                  • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                  • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast_stricmp
                  • String ID: P!@
                  • API String ID: 1278613211-1774101457
                  • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                  • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                  • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                  • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                  APIs
                  • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                  • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: AttributesFilestrcmp
                  • String ID: c.wnry
                  • API String ID: 3324900478-3240288721
                  • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                  • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                  • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                  • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                  APIs
                  • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                  • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: ??3@CloseHandle
                  • String ID: $l@
                  • API String ID: 3816424416-2140230165
                  • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                  • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                  • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                  • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                  APIs
                  • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                  • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1301248082.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 0000000A.00000002.1301225837.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301276948.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301298100.000000000040E000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000410000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.00000000004BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1301324290.0000000000750000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_400000_tasksche.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalSection$Leave$Entermemcpy
                  • String ID:
                  • API String ID: 3435569088-0
                  • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                  • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                  • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                  • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65