Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6KJ3FjgeLv.dll

Overview

General Information

Sample name:6KJ3FjgeLv.dll
renamed because original name is a hash value
Original sample name:167cc6223dcc27b7ae7d9bb9d7da4237.dll
Analysis ID:1591256
MD5:167cc6223dcc27b7ae7d9bb9d7da4237
SHA1:334a2b0ae8465204ddbb84ec9a5cd0150698f1b6
SHA256:d7afcc0c252f61c2c3ffc230b9459c762c431e0f7003a186be6fcf234e948eb9
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6720 cmdline: loaddll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6884 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6976 cmdline: rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6908 cmdline: rundll32.exe C:\Users\user\Desktop\6KJ3FjgeLv.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7028 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 56246E2D641CD17BE2918ADBBFCC29D7)
        • tasksche.exe (PID: 1104 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 46666A9A0D8DF0DF785D38F39ACCE1E1)
    • rundll32.exe (PID: 2144 cmdline: rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 2676 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 56246E2D641CD17BE2918ADBBFCC29D7)
        • tasksche.exe (PID: 6156 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 46666A9A0D8DF0DF785D38F39ACCE1E1)
  • mssecsvc.exe (PID: 7164 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 56246E2D641CD17BE2918ADBBFCC29D7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
6KJ3FjgeLv.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    6KJ3FjgeLv.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    6KJ3FjgeLv.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          0000000A.00000000.1747527147.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          6.2.mssecsvc.exe.23868c8.6.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          6.0.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            6.0.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0xf4d8:$x3: tasksche.exe
            • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0xf52c:$x5: WNcry@2ol7
            • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0xf42c:$s3: cmd.exe /c "%s"
            • 0x41980:$s4: msg/m_portuguese.wnry
            • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            6.0.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            6.0.mssecsvc.exe.7100a4.1.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
            • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
            Click to see the 135 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:55:06.608017+010020315153Misc activity104.16.167.22880192.168.2.449730TCP
            2025-01-14T20:55:07.278666+010020315153Misc activity104.16.167.22880192.168.2.449731TCP
            2025-01-14T20:55:09.417351+010020315153Misc activity104.16.167.22880192.168.2.449753TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:55:06.085913+010020242911A Network Trojan was detected192.168.2.4592511.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:55:06.607154+010020242981A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-14T20:55:07.277928+010020242981A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-14T20:55:09.417085+010020242981A Network Trojan was detected192.168.2.449753104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:55:06.607154+010020242991A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-14T20:55:07.277928+010020242991A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-14T20:55:09.417085+010020242991A Network Trojan was detected192.168.2.449753104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:55:06.607154+010020243011A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-14T20:55:07.277928+010020243011A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-14T20:55:09.417085+010020243011A Network Trojan was detected192.168.2.449753104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:55:06.607154+010020243021A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-14T20:55:07.277928+010020243021A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-14T20:55:09.417085+010020243021A Network Trojan was detected192.168.2.449753104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:55:06.607154+010028033043Unknown Traffic192.168.2.449730104.16.167.22880TCP
            2025-01-14T20:55:07.277928+010028033043Unknown Traffic192.168.2.449731104.16.167.22880TCP
            2025-01-14T20:55:09.417085+010028033043Unknown Traffic192.168.2.449753104.16.167.22880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 6KJ3FjgeLv.dllAvira: detected
            Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
            Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 90%
            Source: C:\Windows\tasksche.exeReversingLabs: Detection: 90%
            Source: 6KJ3FjgeLv.dllReversingLabs: Detection: 94%
            Source: 6KJ3FjgeLv.dllVirustotal: Detection: 94%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
            Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
            Source: 6KJ3FjgeLv.dllJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

            Exploits

            barindex
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: 6KJ3FjgeLv.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49753 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49753 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49753 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49753 -> 104.16.167.228:80
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:55:06 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90202e85d8ac0f5b-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:55:07 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90202e8a0a308c41-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:55:09 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90202e975b554310-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.4:59251 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49753 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49731
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49730
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49753
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.66
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.66
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.66
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.1
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.66
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.1
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.1
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.1
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.1
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.1
            Source: unknownTCP traffic detected without corresponding DNS query: 132.173.19.1
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.119
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.119
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.119
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.1
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.119
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.1
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.1
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.1
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.1
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.1
            Source: unknownTCP traffic detected without corresponding DNS query: 113.105.176.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.150
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.150
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.150
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.150
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.43.74.1
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.87
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.87
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.87
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.1
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.1
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.1
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.87
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.1
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.1
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.1
            Source: unknownTCP traffic detected without corresponding DNS query: 41.25.189.1
            Source: unknownTCP traffic detected without corresponding DNS query: 21.20.144.56
            Source: unknownTCP traffic detected without corresponding DNS query: 21.20.144.56
            Source: unknownTCP traffic detected without corresponding DNS query: 21.20.144.56
            Source: unknownTCP traffic detected without corresponding DNS query: 21.20.144.1
            Source: unknownTCP traffic detected without corresponding DNS query: 21.20.144.56
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: 6KJ3FjgeLv.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: mssecsvc.exe, 00000009.00000002.1750275425.0000000000B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
            Source: mssecsvc.exe, 00000005.00000002.1731676920.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/-V
            Source: mssecsvc.exe, 00000005.00000002.1731676920.0000000000C69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
            Source: mssecsvc.exe, 00000005.00000002.1731676920.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/3J
            Source: mssecsvc.exe, 00000005.00000002.1731676920.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6H
            Source: mssecsvc.exe, 00000006.00000002.2360049830.0000000000B27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/A
            Source: mssecsvc.exe, 00000006.00000002.2359509923.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
            Source: mssecsvc.exe, 00000005.00000002.1731676920.0000000000C4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comO
            Source: mssecsvc.exe, 00000005.00000002.1731676920.0000000000CBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1750275425.0000000000B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
            Source: Yara matchFile source: 6KJ3FjgeLv.dll, type: SAMPLE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e96128.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e73104.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.2395948.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e96128.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e73104.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23918e8.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.2395948.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23868c8.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e6f0a4.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2360409683.0000000001E73000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1718570812.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.1711072603.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1731154615.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2360722246.0000000002395000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.1711217728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1739870438.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1749488758.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1749705209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1718691548.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1740032845.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7028, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7164, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 2676, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

            System Summary

            barindex
            Source: 6KJ3FjgeLv.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6KJ3FjgeLv.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23868c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e64084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e96128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e96128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e96128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e73104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e73104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.1e73104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.2395948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.2395948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.2395948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e96128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e96128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e96128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e73104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e73104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23918e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23918e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.2395948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.2395948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23868c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23868c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e6f0a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e6f0a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000000.1747527147.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2360409683.0000000001E73000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000000.1729995708.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000002.1748476153.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2360722246.0000000002395000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000000.1711217728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000002.1749705209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000000.1718691548.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000000.1740032845.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
            Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
            Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
            Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
            Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
            Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
            Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
            Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
            Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
            Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
            Source: 6KJ3FjgeLv.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: 6KJ3FjgeLv.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6KJ3FjgeLv.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23868c8.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e64084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23b896c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e96128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e96128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e96128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e73104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e73104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.1e73104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.2395948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.2395948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.2395948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e96128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e96128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e96128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23b896c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e64084.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e73104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e73104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23918e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23918e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.2395948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.2395948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23868c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23868c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e6f0a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e6f0a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000000.1747527147.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2360409683.0000000001E73000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000000.1729995708.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000002.1748476153.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2360722246.0000000002395000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000000.1711217728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000002.1749705209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000000.1718691548.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000000.1740032845.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: tasksche.exe, 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000000.1747527147.000000000040E000.00000008.00000001.01000000.00000007.sdmp, 6KJ3FjgeLv.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
            Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6740:120:WilError_03
            Source: 6KJ3FjgeLv.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6KJ3FjgeLv.dll,PlayGame
            Source: 6KJ3FjgeLv.dllReversingLabs: Detection: 94%
            Source: 6KJ3FjgeLv.dllVirustotal: Detection: 94%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6KJ3FjgeLv.dll,PlayGame
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",PlayGame
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6KJ3FjgeLv.dll,PlayGameJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",PlayGameJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: 6KJ3FjgeLv.dllStatic file information: File size 5267459 > 1048576
            Source: 6KJ3FjgeLv.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
            Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
            Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 1900Thread sleep count: 95 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 1900Thread sleep time: -190000s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 1136Thread sleep count: 126 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 1136Thread sleep count: 36 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 1900Thread sleep time: -86400000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: mssecsvc.exe, 00000009.00000002.1750275425.0000000000B04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8U
            Source: mssecsvc.exe, 00000005.00000002.1731676920.0000000000CB3000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.1731676920.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2360049830.0000000000B7C000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2360049830.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2360049830.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1750275425.0000000000B3B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1750275425.0000000000B12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1Jump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Service Execution
            4
            Windows Service
            4
            Windows Service
            12
            Masquerading
            OS Credential Dumping1
            Network Share Discovery
            Remote Services1
            Archive Collected Data
            22
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            21
            Virtualization/Sandbox Evasion
            LSASS Memory111
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            11
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDS2
            System Information Discovery
            Distributed Component Object ModelInput Capture3
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Rundll32
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591256 Sample: 6KJ3FjgeLv.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 41 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->41 59 Tries to download HTTP data from a sinkholed server 2->59 61 Suricata IDS alerts for network traffic 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 6 other signatures 2->65 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        17 rundll32.exe 9->17         started        20 cmd.exe 1 9->20         started        22 conhost.exe 9->22         started        43 192.168.2.102 unknown unknown 11->43 45 192.168.2.103 unknown unknown 11->45 47 98 other IPs or domains 11->47 69 Connects to many different private IPs via SMB (likely to spread or exploit) 11->69 71 Connects to many different private IPs (likely to spread or exploit) 11->71 signatures6 process7 signatures8 24 mssecsvc.exe 7 15->24         started        57 Drops executables to the windows directory (C:\Windows) and starts them 17->57 27 mssecsvc.exe 7 17->27         started        30 rundll32.exe 1 20->30         started        process9 file10 37 C:\Windows\tasksche.exe, PE32 24->37 dropped 32 tasksche.exe 24->32         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 67 Drops executables to the windows directory (C:\Windows) and starts them 27->67 35 tasksche.exe 27->35         started        signatures11 process12 signatures13 49 Detected Wannacry Ransomware 32->49 51 Antivirus detection for dropped file 32->51 53 Multi AV Scanner detection for dropped file 32->53 55 Machine Learning detection for dropped file 32->55

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            6KJ3FjgeLv.dll95%ReversingLabsWin32.Ransomware.WannaCry
            6KJ3FjgeLv.dll94%VirustotalBrowse
            6KJ3FjgeLv.dll100%AviraTR/AD.WannaCry.idaws
            6KJ3FjgeLv.dll100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\tasksche.exe100%AviraTR/AD.WannaCry.sewvt
            C:\Windows\tasksche.exe100%Joe Sandbox ML
            C:\WINDOWS\qeriuwjhrf (copy)90%ReversingLabsWin32.Ransomware.WannaCry
            C:\Windows\tasksche.exe90%ReversingLabsWin32.Ransomware.WannaCry
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comO0%Avira URL Cloudsafe
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
            https://www.kryptoslogic.com0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            104.16.167.228
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com6KJ3FjgeLv.dllfalse
                  high
                  https://www.kryptoslogic.commssecsvc.exe, 00000005.00000002.1731676920.0000000000CBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1750275425.0000000000B43000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6Hmssecsvc.exe, 00000005.00000002.1731676920.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Amssecsvc.exe, 00000006.00000002.2360049830.0000000000B27000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comOmssecsvc.exe, 00000005.00000002.1731676920.0000000000C4E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000005.00000002.1731676920.0000000000C69000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/-Vmssecsvc.exe, 00000005.00000002.1731676920.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/3Jmssecsvc.exe, 00000005.00000002.1731676920.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000006.00000002.2359509923.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            125.172.29.1
                            unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                            74.197.101.1
                            unknownUnited States
                            19108SUDDENLINK-COMMUNICATIONSUSfalse
                            156.2.142.220
                            unknownUnited States
                            29975VODACOM-ZAfalse
                            182.204.40.232
                            unknownChina
                            4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                            132.173.19.2
                            unknownUnited States
                            32982DOE-HQUSfalse
                            4.143.32.2
                            unknownUnited States
                            3356LEVEL3USfalse
                            132.173.19.1
                            unknownUnited States
                            32982DOE-HQUSfalse
                            4.143.32.1
                            unknownUnited States
                            3356LEVEL3USfalse
                            1.43.74.150
                            unknownAustralia
                            4804MPX-ASMicroplexPTYLTDAUfalse
                            208.220.165.1
                            unknownUnited States
                            701UUNETUSfalse
                            182.204.40.1
                            unknownChina
                            4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                            24.228.248.149
                            unknownUnited States
                            6128CABLE-NET-1USfalse
                            178.151.38.198
                            unknownUkraine
                            13188TRIOLANUAfalse
                            21.20.144.2
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            21.20.144.1
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            178.11.215.1
                            unknownGermany
                            3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                            178.11.215.2
                            unknownGermany
                            3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                            156.2.142.1
                            unknownUnited States
                            29975VODACOM-ZAfalse
                            165.212.249.1
                            unknownUnited States
                            36351SOFTLAYERUSfalse
                            181.68.205.1
                            unknownColombia
                            27831ColombiaMovilCOfalse
                            181.68.205.2
                            unknownColombia
                            27831ColombiaMovilCOfalse
                            155.202.46.1
                            unknownUnited Kingdom
                            8698NationwideBuildingSocietyGBfalse
                            IP
                            192.168.2.148
                            192.168.2.149
                            192.168.2.146
                            192.168.2.147
                            192.168.2.140
                            192.168.2.141
                            192.168.2.144
                            192.168.2.145
                            192.168.2.142
                            192.168.2.143
                            192.168.2.159
                            192.168.2.157
                            192.168.2.158
                            192.168.2.151
                            192.168.2.152
                            192.168.2.150
                            192.168.2.155
                            192.168.2.156
                            192.168.2.153
                            192.168.2.154
                            192.168.2.126
                            192.168.2.247
                            192.168.2.127
                            192.168.2.248
                            192.168.2.124
                            192.168.2.245
                            192.168.2.125
                            192.168.2.246
                            192.168.2.128
                            192.168.2.249
                            192.168.2.129
                            192.168.2.240
                            192.168.2.122
                            192.168.2.243
                            192.168.2.123
                            192.168.2.244
                            192.168.2.120
                            192.168.2.241
                            192.168.2.121
                            192.168.2.242
                            192.168.2.97
                            192.168.2.137
                            192.168.2.96
                            192.168.2.138
                            192.168.2.99
                            192.168.2.135
                            192.168.2.98
                            192.168.2.136
                            192.168.2.139
                            192.168.2.250
                            192.168.2.130
                            192.168.2.251
                            192.168.2.91
                            192.168.2.90
                            192.168.2.93
                            192.168.2.133
                            192.168.2.254
                            192.168.2.92
                            192.168.2.134
                            192.168.2.95
                            192.168.2.131
                            192.168.2.252
                            192.168.2.94
                            192.168.2.132
                            192.168.2.253
                            192.168.2.104
                            192.168.2.225
                            192.168.2.105
                            192.168.2.226
                            192.168.2.102
                            192.168.2.223
                            192.168.2.103
                            192.168.2.224
                            192.168.2.108
                            192.168.2.229
                            192.168.2.109
                            192.168.2.106
                            192.168.2.227
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1591256
                            Start date and time:2025-01-14 20:54:10 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 31s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:14
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:6KJ3FjgeLv.dll
                            renamed because original name is a hash value
                            Original Sample Name:167cc6223dcc27b7ae7d9bb9d7da4237.dll
                            Detection:MAL
                            Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HCA Information:Failed
                            Cookbook Comments:
                            • Found application associated with file extension: .dll
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 199.232.210.172, 2.17.190.73, 20.109.210.53, 13.107.246.45
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target tasksche.exe, PID 1104 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            14:55:08API Interceptor1x Sleep call for process: loaddll32.exe modified
                            14:55:40API Interceptor112x Sleep call for process: mssecsvc.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            178.151.38.1982GjzjjC4i8Get hashmaliciousMiraiBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comhttp://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                              • 104.16.166.228
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                              • 104.16.166.228
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                              • 104.16.167.228
                              LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              qt680eucI4.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                              • 104.16.167.228
                              qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                              • 104.17.244.81
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                              • 104.17.244.81
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CHINANET-BACKBONENo31Jin-rongStreetCNFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                              • 36.50.208.242
                              meth10.elfGet hashmaliciousMiraiBrowse
                              • 218.0.197.161
                              meth3.elfGet hashmaliciousMiraiBrowse
                              • 42.101.123.196
                              meth8.elfGet hashmaliciousMiraiBrowse
                              • 110.155.210.172
                              meth1.elfGet hashmaliciousMiraiBrowse
                              • 113.88.63.73
                              arm4.elfGet hashmaliciousUnknownBrowse
                              • 14.155.131.244
                              ppc.elfGet hashmaliciousUnknownBrowse
                              • 101.249.106.89
                              m68k.elfGet hashmaliciousUnknownBrowse
                              • 125.82.233.51
                              i686.elfGet hashmaliciousUnknownBrowse
                              • 61.150.155.184
                              x86.elfGet hashmaliciousUnknownBrowse
                              • 106.42.32.243
                              OCNNTTCommunicationsCorporationJPFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                              • 123.224.18.174
                              meth10.elfGet hashmaliciousMiraiBrowse
                              • 157.106.137.200
                              meth3.elfGet hashmaliciousMiraiBrowse
                              • 123.222.206.237
                              meth1.elfGet hashmaliciousMiraiBrowse
                              • 58.92.220.23
                              x86.elfGet hashmaliciousUnknownBrowse
                              • 153.204.125.184
                              meth4.elfGet hashmaliciousMiraiBrowse
                              • 157.69.76.176
                              i486.elfGet hashmaliciousUnknownBrowse
                              • 125.173.202.252
                              meth2.elfGet hashmaliciousMiraiBrowse
                              • 180.21.71.141
                              mips.elfGet hashmaliciousUnknownBrowse
                              • 180.46.6.191
                              mpsl.elfGet hashmaliciousUnknownBrowse
                              • 222.148.143.127
                              SUDDENLINK-COMMUNICATIONSUSmeth1.elfGet hashmaliciousMiraiBrowse
                              • 47.222.230.125
                              arm4.elfGet hashmaliciousUnknownBrowse
                              • 173.217.238.165
                              6.elfGet hashmaliciousUnknownBrowse
                              • 75.109.54.232
                              res.mpsl.elfGet hashmaliciousUnknownBrowse
                              • 47.215.241.41
                              armv6l.elfGet hashmaliciousUnknownBrowse
                              • 47.220.169.215
                              5.elfGet hashmaliciousUnknownBrowse
                              • 74.225.230.170
                              Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
                              • 74.249.51.157
                              Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                              • 173.81.206.117
                              Fantazy.arm7.elfGet hashmaliciousMiraiBrowse
                              • 75.108.135.152
                              Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                              • 47.219.212.143
                              VODACOM-ZAmeth1.elfGet hashmaliciousMiraiBrowse
                              • 41.8.13.89
                              i686.elfGet hashmaliciousUnknownBrowse
                              • 105.249.84.7
                              x86.elfGet hashmaliciousUnknownBrowse
                              • 156.24.33.234
                              meth4.elfGet hashmaliciousMiraiBrowse
                              • 156.133.93.238
                              meth14.elfGet hashmaliciousMiraiBrowse
                              • 41.4.84.98
                              meth2.elfGet hashmaliciousMiraiBrowse
                              • 41.18.52.109
                              meth5.elfGet hashmaliciousMiraiBrowse
                              • 41.23.86.74
                              meth15.elfGet hashmaliciousMiraiBrowse
                              • 41.15.20.18
                              meth7.elfGet hashmaliciousMiraiBrowse
                              • 41.15.176.218
                              sh4.elfGet hashmaliciousUnknownBrowse
                              • 156.24.5.89
                              No context
                              No context
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.863852427390409
                              Encrypted:false
                              SSDEEP:98304:QqPoBhzXRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPeBxcxk3ZAEUadzR8yc4Hj
                              MD5:46666A9A0D8DF0DF785D38F39ACCE1E1
                              SHA1:36950A4C8202261CB2A059BD39001A7B79E78054
                              SHA-256:84F3C5BA28FA45326C7C7F5085C5033B575F7427AF82FBB13D323BBE58D8B1F5
                              SHA-512:79005C0BFF599E36DACB86E5CFCF69E270D7253879EEA7FC8A966E3D2829F8CD2D5D298694CFB742D2DAC375681DB98025C3CFC5F3EAABF5E4697DCD2F57059C
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 90%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.863852427390409
                              Encrypted:false
                              SSDEEP:98304:QqPoBhzXRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPeBxcxk3ZAEUadzR8yc4Hj
                              MD5:46666A9A0D8DF0DF785D38F39ACCE1E1
                              SHA1:36950A4C8202261CB2A059BD39001A7B79E78054
                              SHA-256:84F3C5BA28FA45326C7C7F5085C5033B575F7427AF82FBB13D323BBE58D8B1F5
                              SHA-512:79005C0BFF599E36DACB86E5CFCF69E270D7253879EEA7FC8A966E3D2829F8CD2D5D298694CFB742D2DAC375681DB98025C3CFC5F3EAABF5E4697DCD2F57059C
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 90%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.20307873438479
                              TrID:
                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                              • Generic Win/DOS Executable (2004/3) 0.20%
                              • DOS Executable Generic (2002/1) 0.20%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:6KJ3FjgeLv.dll
                              File size:5'267'459 bytes
                              MD5:167cc6223dcc27b7ae7d9bb9d7da4237
                              SHA1:334a2b0ae8465204ddbb84ec9a5cd0150698f1b6
                              SHA256:d7afcc0c252f61c2c3ffc230b9459c762c431e0f7003a186be6fcf234e948eb9
                              SHA512:93c0ac00739a3937a4236c265279d104a7dd9d1c59758256f516c2d6134c103c158d1aece094edc40bb70a2938147ead6aa91b8bce62578510d27efde32a06eb
                              SSDEEP:98304:+DqPoBhzXRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPeBxcxk3ZAEUadzR8yc4H
                              TLSH:E8363354A26CA1BCF0480DF444638A1AB7B73C6667BE5F1F9BC087660C43B5BBBD4A41
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                              Icon Hash:7ae282899bbab082
                              Entrypoint:0x100011e9
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x10000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                              DLL Characteristics:
                              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                              Instruction
                              push ebp
                              mov ebp, esp
                              push ebx
                              mov ebx, dword ptr [ebp+08h]
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              push edi
                              mov edi, dword ptr [ebp+10h]
                              test esi, esi
                              jne 00007F09D8DFD22Bh
                              cmp dword ptr [10003140h], 00000000h
                              jmp 00007F09D8DFD248h
                              cmp esi, 01h
                              je 00007F09D8DFD227h
                              cmp esi, 02h
                              jne 00007F09D8DFD244h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F09D8DFD22Bh
                              push edi
                              push esi
                              push ebx
                              call eax
                              test eax, eax
                              je 00007F09D8DFD22Eh
                              push edi
                              push esi
                              push ebx
                              call 00007F09D8DFD13Ah
                              test eax, eax
                              jne 00007F09D8DFD226h
                              xor eax, eax
                              jmp 00007F09D8DFD270h
                              push edi
                              push esi
                              push ebx
                              call 00007F09D8DFCFECh
                              cmp esi, 01h
                              mov dword ptr [ebp+0Ch], eax
                              jne 00007F09D8DFD22Eh
                              test eax, eax
                              jne 00007F09D8DFD259h
                              push edi
                              push eax
                              push ebx
                              call 00007F09D8DFD116h
                              test esi, esi
                              je 00007F09D8DFD227h
                              cmp esi, 03h
                              jne 00007F09D8DFD248h
                              push edi
                              push esi
                              push ebx
                              call 00007F09D8DFD105h
                              test eax, eax
                              jne 00007F09D8DFD225h
                              and dword ptr [ebp+0Ch], eax
                              cmp dword ptr [ebp+0Ch], 00000000h
                              je 00007F09D8DFD233h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F09D8DFD22Ah
                              push edi
                              push esi
                              push ebx
                              call eax
                              mov dword ptr [ebp+0Ch], eax
                              mov eax, dword ptr [ebp+0Ch]
                              pop edi
                              pop esi
                              pop ebx
                              pop ebp
                              retn 000Ch
                              jmp dword ptr [10002028h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              Programming Language:
                              • [ C ] VS98 (6.0) build 8168
                              • [C++] VS98 (6.0) build 8168
                              • [RES] VS98 (6.0) cvtres build 1720
                              • [LNK] VS98 (6.0) imp/exp build 8168
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x40000x5000600x5010000f84e1b646c92d9dbced2e2b9a040359unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              W0x40600x500000dataEnglishUnited States0.8770942687988281
                              DLLImport
                              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                              NameOrdinalAddress
                              PlayGame10x10001114
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-14T20:55:06.085913+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.4592511.1.1.153UDP
                              2025-01-14T20:55:06.607154+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730104.16.167.22880TCP
                              2025-01-14T20:55:06.607154+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449730104.16.167.22880TCP
                              2025-01-14T20:55:06.607154+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449730104.16.167.22880TCP
                              2025-01-14T20:55:06.607154+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449730104.16.167.22880TCP
                              2025-01-14T20:55:06.607154+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449730104.16.167.22880TCP
                              2025-01-14T20:55:06.608017+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449730TCP
                              2025-01-14T20:55:07.277928+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449731104.16.167.22880TCP
                              2025-01-14T20:55:07.277928+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449731104.16.167.22880TCP
                              2025-01-14T20:55:07.277928+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449731104.16.167.22880TCP
                              2025-01-14T20:55:07.277928+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449731104.16.167.22880TCP
                              2025-01-14T20:55:07.277928+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449731104.16.167.22880TCP
                              2025-01-14T20:55:07.278666+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449731TCP
                              2025-01-14T20:55:09.417085+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449753104.16.167.22880TCP
                              2025-01-14T20:55:09.417085+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449753104.16.167.22880TCP
                              2025-01-14T20:55:09.417085+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449753104.16.167.22880TCP
                              2025-01-14T20:55:09.417085+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449753104.16.167.22880TCP
                              2025-01-14T20:55:09.417085+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449753104.16.167.22880TCP
                              2025-01-14T20:55:09.417351+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449753TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 20:55:06.105262995 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.112034082 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:06.112109900 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.112283945 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.118650913 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:06.606933117 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:06.607153893 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.608016968 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:06.608052015 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.608073950 CET4973080192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.612832069 CET8049730104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:06.757492065 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.762408018 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:06.762538910 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.762994051 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:06.767767906 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:07.277864933 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:07.277928114 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:07.278393030 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:07.278666019 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:07.278731108 CET4973180192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:07.283211946 CET8049731104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:07.400902033 CET49732445192.168.2.4132.173.19.66
                              Jan 14, 2025 20:55:07.405823946 CET44549732132.173.19.66192.168.2.4
                              Jan 14, 2025 20:55:07.405893087 CET49732445192.168.2.4132.173.19.66
                              Jan 14, 2025 20:55:07.405935049 CET49732445192.168.2.4132.173.19.66
                              Jan 14, 2025 20:55:07.406573057 CET49733445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:07.411109924 CET44549732132.173.19.66192.168.2.4
                              Jan 14, 2025 20:55:07.411154985 CET49732445192.168.2.4132.173.19.66
                              Jan 14, 2025 20:55:07.411336899 CET44549733132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:07.411391973 CET49733445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:07.411426067 CET49733445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:07.416415930 CET44549733132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:07.416461945 CET49733445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:07.429380894 CET49734445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:07.434258938 CET44549734132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:07.434503078 CET49734445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:07.434576988 CET49734445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:07.439950943 CET44549734132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:07.498349905 CET49675443192.168.2.4173.222.162.32
                              Jan 14, 2025 20:55:08.925287962 CET4975380192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:08.930205107 CET8049753104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:08.930279016 CET4975380192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:08.930411100 CET4975380192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:08.935142040 CET8049753104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:09.311237097 CET49758445192.168.2.4113.105.176.119
                              Jan 14, 2025 20:55:09.316195965 CET44549758113.105.176.119192.168.2.4
                              Jan 14, 2025 20:55:09.316277981 CET49758445192.168.2.4113.105.176.119
                              Jan 14, 2025 20:55:09.316303968 CET49758445192.168.2.4113.105.176.119
                              Jan 14, 2025 20:55:09.316464901 CET49759445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:09.321297884 CET44549758113.105.176.119192.168.2.4
                              Jan 14, 2025 20:55:09.321315050 CET44549759113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:09.321362019 CET49758445192.168.2.4113.105.176.119
                              Jan 14, 2025 20:55:09.321391106 CET49759445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:09.321480036 CET49759445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:09.322747946 CET49760445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:09.326375961 CET44549759113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:09.326438904 CET49759445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:09.327541113 CET44549760113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:09.327615976 CET49760445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:09.327672005 CET49760445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:09.332417965 CET44549760113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:09.416944027 CET8049753104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:09.417084932 CET4975380192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:09.417124033 CET4975380192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:09.417351007 CET8049753104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:09.417402029 CET4975380192.168.2.4104.16.167.228
                              Jan 14, 2025 20:55:09.422032118 CET8049753104.16.167.228192.168.2.4
                              Jan 14, 2025 20:55:11.326679945 CET49780445192.168.2.41.43.74.150
                              Jan 14, 2025 20:55:11.331629992 CET445497801.43.74.150192.168.2.4
                              Jan 14, 2025 20:55:11.331782103 CET49780445192.168.2.41.43.74.150
                              Jan 14, 2025 20:55:11.331782103 CET49780445192.168.2.41.43.74.150
                              Jan 14, 2025 20:55:11.332046986 CET49781445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:11.336699009 CET445497801.43.74.150192.168.2.4
                              Jan 14, 2025 20:55:11.336756945 CET49780445192.168.2.41.43.74.150
                              Jan 14, 2025 20:55:11.336843967 CET445497811.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:11.336937904 CET49781445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:11.336937904 CET49781445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:11.338251114 CET49782445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:11.341846943 CET445497811.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:11.342272997 CET49781445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:11.343034983 CET445497821.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:11.343095064 CET49782445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:11.343156099 CET49782445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:11.347914934 CET445497821.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:13.342644930 CET49805445192.168.2.441.25.189.87
                              Jan 14, 2025 20:55:13.347528934 CET4454980541.25.189.87192.168.2.4
                              Jan 14, 2025 20:55:13.347637892 CET49805445192.168.2.441.25.189.87
                              Jan 14, 2025 20:55:13.347754955 CET49805445192.168.2.441.25.189.87
                              Jan 14, 2025 20:55:13.347893000 CET49806445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:13.352679968 CET4454980541.25.189.87192.168.2.4
                              Jan 14, 2025 20:55:13.352690935 CET4454980641.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:13.352783918 CET49806445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:13.352838039 CET49806445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:13.352883101 CET49805445192.168.2.441.25.189.87
                              Jan 14, 2025 20:55:13.354042053 CET49807445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:13.357906103 CET4454980641.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:13.357959986 CET49806445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:13.358830929 CET4454980741.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:13.358899117 CET49807445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:13.358951092 CET49807445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:13.363711119 CET4454980741.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:15.360255957 CET49829445192.168.2.421.20.144.56
                              Jan 14, 2025 20:55:15.366013050 CET4454982921.20.144.56192.168.2.4
                              Jan 14, 2025 20:55:15.366092920 CET49829445192.168.2.421.20.144.56
                              Jan 14, 2025 20:55:15.366197109 CET49829445192.168.2.421.20.144.56
                              Jan 14, 2025 20:55:15.366421938 CET49831445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:15.371378899 CET4454982921.20.144.56192.168.2.4
                              Jan 14, 2025 20:55:15.371392012 CET4454983121.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:15.371428013 CET49829445192.168.2.421.20.144.56
                              Jan 14, 2025 20:55:15.371474028 CET49831445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:15.371599913 CET49831445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:15.374963999 CET49832445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:15.377012968 CET4454983121.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:15.377055883 CET49831445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:15.379889965 CET4454983221.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:15.379970074 CET49832445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:15.380028963 CET49832445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:15.384871006 CET4454983221.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:17.373575926 CET49853445192.168.2.4178.11.215.204
                              Jan 14, 2025 20:55:17.378635883 CET44549853178.11.215.204192.168.2.4
                              Jan 14, 2025 20:55:17.378743887 CET49853445192.168.2.4178.11.215.204
                              Jan 14, 2025 20:55:17.378773928 CET49853445192.168.2.4178.11.215.204
                              Jan 14, 2025 20:55:17.378989935 CET49854445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:17.383786917 CET44549853178.11.215.204192.168.2.4
                              Jan 14, 2025 20:55:17.383862019 CET49853445192.168.2.4178.11.215.204
                              Jan 14, 2025 20:55:17.384085894 CET44549854178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:17.384157896 CET49854445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:17.384226084 CET49854445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:17.385179043 CET49855445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:17.389199972 CET44549854178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:17.389278889 CET49854445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:17.390197039 CET44549855178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:17.390271902 CET49855445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:17.390316963 CET49855445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:17.395389080 CET44549855178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:19.389012098 CET49877445192.168.2.4201.115.177.15
                              Jan 14, 2025 20:55:19.394818068 CET44549877201.115.177.15192.168.2.4
                              Jan 14, 2025 20:55:19.394908905 CET49877445192.168.2.4201.115.177.15
                              Jan 14, 2025 20:55:19.402451038 CET49877445192.168.2.4201.115.177.15
                              Jan 14, 2025 20:55:19.402910948 CET49878445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:19.408303976 CET44549877201.115.177.15192.168.2.4
                              Jan 14, 2025 20:55:19.408554077 CET49877445192.168.2.4201.115.177.15
                              Jan 14, 2025 20:55:19.408809900 CET44549878201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:19.408874989 CET49878445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:19.408907890 CET49878445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:19.409311056 CET49879445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:19.414782047 CET44549878201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:19.414838076 CET49878445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:19.414916039 CET44549879201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:19.414983034 CET49879445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:19.415178061 CET49879445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:19.420583010 CET44549879201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:21.404891014 CET49904445192.168.2.44.143.32.158
                              Jan 14, 2025 20:55:21.409849882 CET445499044.143.32.158192.168.2.4
                              Jan 14, 2025 20:55:21.409945965 CET49904445192.168.2.44.143.32.158
                              Jan 14, 2025 20:55:21.410054922 CET49904445192.168.2.44.143.32.158
                              Jan 14, 2025 20:55:21.410263062 CET49906445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:21.414957047 CET445499044.143.32.158192.168.2.4
                              Jan 14, 2025 20:55:21.415008068 CET49904445192.168.2.44.143.32.158
                              Jan 14, 2025 20:55:21.415097952 CET445499064.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:21.415329933 CET49906445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:21.415476084 CET49906445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:21.415870905 CET49907445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:21.420780897 CET445499074.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:21.420845985 CET445499064.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:21.420888901 CET49907445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:21.420907974 CET49906445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:21.421156883 CET49907445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:21.425952911 CET445499074.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:23.419420958 CET49932445192.168.2.4181.68.205.37
                              Jan 14, 2025 20:55:23.424249887 CET44549932181.68.205.37192.168.2.4
                              Jan 14, 2025 20:55:23.424351931 CET49932445192.168.2.4181.68.205.37
                              Jan 14, 2025 20:55:23.424390078 CET49932445192.168.2.4181.68.205.37
                              Jan 14, 2025 20:55:23.424587965 CET49933445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:23.431874990 CET44549933181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:23.431910038 CET44549932181.68.205.37192.168.2.4
                              Jan 14, 2025 20:55:23.431982040 CET49932445192.168.2.4181.68.205.37
                              Jan 14, 2025 20:55:23.431998014 CET49933445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:23.432110071 CET49933445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:23.432396889 CET49934445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:23.437465906 CET44549933181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:23.437527895 CET49933445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:23.437674046 CET44549934181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:23.437777042 CET49934445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:23.437838078 CET49934445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:23.442985058 CET44549934181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:25.450143099 CET49957445192.168.2.48.127.54.110
                              Jan 14, 2025 20:55:25.455085993 CET445499578.127.54.110192.168.2.4
                              Jan 14, 2025 20:55:25.455161095 CET49957445192.168.2.48.127.54.110
                              Jan 14, 2025 20:55:25.458930016 CET49957445192.168.2.48.127.54.110
                              Jan 14, 2025 20:55:25.459080935 CET49958445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:25.463895082 CET445499588.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:25.463948011 CET49958445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:25.464015961 CET445499578.127.54.110192.168.2.4
                              Jan 14, 2025 20:55:25.464065075 CET49957445192.168.2.48.127.54.110
                              Jan 14, 2025 20:55:25.468206882 CET49958445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:25.473237991 CET445499588.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:25.473287106 CET49958445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:25.493875980 CET49959445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:25.498703957 CET445499598.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:25.498887062 CET49959445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:25.510771036 CET49959445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:25.515557051 CET445499598.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:27.450808048 CET49980445192.168.2.4125.172.29.11
                              Jan 14, 2025 20:55:27.455790043 CET44549980125.172.29.11192.168.2.4
                              Jan 14, 2025 20:55:27.455883026 CET49980445192.168.2.4125.172.29.11
                              Jan 14, 2025 20:55:27.455921888 CET49980445192.168.2.4125.172.29.11
                              Jan 14, 2025 20:55:27.456048012 CET49981445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:27.460903883 CET44549981125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:27.460946083 CET44549980125.172.29.11192.168.2.4
                              Jan 14, 2025 20:55:27.460983992 CET49981445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:27.461018085 CET49980445192.168.2.4125.172.29.11
                              Jan 14, 2025 20:55:27.461101055 CET49981445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:27.461365938 CET49982445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:27.466191053 CET44549981125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:27.466254950 CET49981445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:27.466804028 CET44549982125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:27.466851950 CET49982445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:27.466877937 CET49982445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:27.471793890 CET44549982125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:28.810113907 CET44549734132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:28.810229063 CET49734445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:28.810286999 CET49734445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:28.810362101 CET49734445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:28.815042019 CET44549734132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:28.815107107 CET44549734132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:29.466406107 CET50004445192.168.2.443.147.188.106
                              Jan 14, 2025 20:55:29.471246004 CET4455000443.147.188.106192.168.2.4
                              Jan 14, 2025 20:55:29.472798109 CET50004445192.168.2.443.147.188.106
                              Jan 14, 2025 20:55:29.472893000 CET50004445192.168.2.443.147.188.106
                              Jan 14, 2025 20:55:29.473079920 CET50005445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:29.477847099 CET4455000443.147.188.106192.168.2.4
                              Jan 14, 2025 20:55:29.477859020 CET4455000543.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:29.477924109 CET50004445192.168.2.443.147.188.106
                              Jan 14, 2025 20:55:29.477967978 CET50005445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:29.478065968 CET50005445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:29.478418112 CET50006445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:29.482952118 CET4455000543.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:29.483194113 CET4455000643.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:29.483258963 CET50005445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:29.483298063 CET50006445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:29.483328104 CET50006445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:29.488056898 CET4455000643.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:30.712285042 CET44549760113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:30.712374926 CET49760445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:30.712490082 CET49760445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:30.712527990 CET49760445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:30.717325926 CET44549760113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:30.717335939 CET44549760113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:31.481928110 CET50027445192.168.2.4208.220.165.76
                              Jan 14, 2025 20:55:31.486728907 CET44550027208.220.165.76192.168.2.4
                              Jan 14, 2025 20:55:31.486819029 CET50027445192.168.2.4208.220.165.76
                              Jan 14, 2025 20:55:31.486953974 CET50027445192.168.2.4208.220.165.76
                              Jan 14, 2025 20:55:31.487148046 CET50028445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:31.492032051 CET44550027208.220.165.76192.168.2.4
                              Jan 14, 2025 20:55:31.492043972 CET44550028208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:31.492096901 CET50027445192.168.2.4208.220.165.76
                              Jan 14, 2025 20:55:31.492136955 CET50028445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:31.492204905 CET50028445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:31.492484093 CET50029445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:31.497076988 CET44550028208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:31.497153044 CET50028445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:31.497278929 CET44550029208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:31.497347116 CET50029445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:31.497386932 CET50029445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:31.503021002 CET44550029208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:31.825509071 CET50035445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:31.830589056 CET44550035132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:31.830697060 CET50035445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:31.830769062 CET50035445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:31.835581064 CET44550035132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:32.733664036 CET445497821.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:32.733794928 CET49782445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:32.733921051 CET49782445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:32.734015942 CET49782445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:32.739166021 CET445497821.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:32.739759922 CET445497821.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:33.497575998 CET50037445192.168.2.4146.123.105.61
                              Jan 14, 2025 20:55:33.502530098 CET44550037146.123.105.61192.168.2.4
                              Jan 14, 2025 20:55:33.502629042 CET50037445192.168.2.4146.123.105.61
                              Jan 14, 2025 20:55:33.502700090 CET50037445192.168.2.4146.123.105.61
                              Jan 14, 2025 20:55:33.502866030 CET50038445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:33.507663012 CET44550038146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:33.507744074 CET50038445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:33.507826090 CET50038445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:33.508089066 CET50039445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:33.508131981 CET44550037146.123.105.61192.168.2.4
                              Jan 14, 2025 20:55:33.508244991 CET44550037146.123.105.61192.168.2.4
                              Jan 14, 2025 20:55:33.508295059 CET50037445192.168.2.4146.123.105.61
                              Jan 14, 2025 20:55:33.512803078 CET44550038146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:33.512883902 CET50038445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:33.512934923 CET44550039146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:33.513006926 CET50039445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:33.513035059 CET50039445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:33.517854929 CET44550039146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:33.716183901 CET50040445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:33.721065044 CET44550040113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:33.721170902 CET50040445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:33.721287012 CET50040445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:33.726100922 CET44550040113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:34.749270916 CET4454980741.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:34.749340057 CET49807445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:34.749416113 CET49807445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:34.749485970 CET49807445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:34.754180908 CET4454980741.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:34.754232883 CET4454980741.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:35.513495922 CET50041445192.168.2.4136.131.128.115
                              Jan 14, 2025 20:55:35.518956900 CET44550041136.131.128.115192.168.2.4
                              Jan 14, 2025 20:55:35.519093990 CET50041445192.168.2.4136.131.128.115
                              Jan 14, 2025 20:55:35.519094944 CET50041445192.168.2.4136.131.128.115
                              Jan 14, 2025 20:55:35.519210100 CET50042445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:35.524223089 CET44550042136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:35.524259090 CET44550041136.131.128.115192.168.2.4
                              Jan 14, 2025 20:55:35.524288893 CET44550041136.131.128.115192.168.2.4
                              Jan 14, 2025 20:55:35.524296045 CET50042445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:35.524344921 CET50041445192.168.2.4136.131.128.115
                              Jan 14, 2025 20:55:35.524420977 CET50042445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:35.524844885 CET50043445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:35.529230118 CET44550042136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:35.529294968 CET50042445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:35.529750109 CET44550043136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:35.529824972 CET50043445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:35.529947996 CET50043445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:35.534846067 CET44550043136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:35.747405052 CET50044445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:35.752399921 CET445500441.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:35.752504110 CET50044445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:35.752546072 CET50044445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:35.757407904 CET445500441.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:36.744472980 CET4454983221.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:36.744699001 CET49832445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:36.744793892 CET49832445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:36.744874001 CET49832445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:36.749640942 CET4454983221.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:36.749691963 CET4454983221.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:37.528872013 CET50045445192.168.2.4156.2.142.220
                              Jan 14, 2025 20:55:37.533690929 CET44550045156.2.142.220192.168.2.4
                              Jan 14, 2025 20:55:37.533782959 CET50045445192.168.2.4156.2.142.220
                              Jan 14, 2025 20:55:37.533819914 CET50045445192.168.2.4156.2.142.220
                              Jan 14, 2025 20:55:37.533945084 CET50046445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:37.539746046 CET44550046156.2.142.1192.168.2.4
                              Jan 14, 2025 20:55:37.539808035 CET50046445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:37.539833069 CET50046445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:37.539979935 CET44550045156.2.142.220192.168.2.4
                              Jan 14, 2025 20:55:37.540038109 CET50045445192.168.2.4156.2.142.220
                              Jan 14, 2025 20:55:37.540296078 CET50047445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:37.545722008 CET44550046156.2.142.1192.168.2.4
                              Jan 14, 2025 20:55:37.545789003 CET50046445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:37.545815945 CET44550047156.2.142.1192.168.2.4
                              Jan 14, 2025 20:55:37.545871019 CET50047445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:37.545958042 CET50047445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:37.550682068 CET44550047156.2.142.1192.168.2.4
                              Jan 14, 2025 20:55:37.764131069 CET50048445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:37.769077063 CET4455004841.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:37.769169092 CET50048445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:37.769282103 CET50048445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:37.774121046 CET4455004841.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:38.763592005 CET44549855178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:38.764399052 CET49855445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:38.764511108 CET49855445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:38.764588118 CET49855445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:38.769514084 CET44549855178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:38.769531012 CET44549855178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:39.544531107 CET50049445192.168.2.4195.5.125.105
                              Jan 14, 2025 20:55:39.549489021 CET44550049195.5.125.105192.168.2.4
                              Jan 14, 2025 20:55:39.549618006 CET50049445192.168.2.4195.5.125.105
                              Jan 14, 2025 20:55:39.549698114 CET50049445192.168.2.4195.5.125.105
                              Jan 14, 2025 20:55:39.549863100 CET50050445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:55:39.554665089 CET44550049195.5.125.105192.168.2.4
                              Jan 14, 2025 20:55:39.554742098 CET50049445192.168.2.4195.5.125.105
                              Jan 14, 2025 20:55:39.554810047 CET44550050195.5.125.1192.168.2.4
                              Jan 14, 2025 20:55:39.554871082 CET50050445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:55:39.554907084 CET50050445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:55:39.555301905 CET50051445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:55:39.559935093 CET44550050195.5.125.1192.168.2.4
                              Jan 14, 2025 20:55:39.559989929 CET50050445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:55:39.560230017 CET44550051195.5.125.1192.168.2.4
                              Jan 14, 2025 20:55:39.560296059 CET50051445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:55:39.560311079 CET50051445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:55:39.565136909 CET44550051195.5.125.1192.168.2.4
                              Jan 14, 2025 20:55:39.747332096 CET50052445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:39.752243996 CET4455005221.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:39.752337933 CET50052445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:39.752399921 CET50052445192.168.2.421.20.144.1
                              Jan 14, 2025 20:55:39.757194996 CET4455005221.20.144.1192.168.2.4
                              Jan 14, 2025 20:55:40.780534983 CET44549879201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:40.780620098 CET49879445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:40.780654907 CET49879445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:40.780698061 CET49879445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:40.785487890 CET44549879201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:40.785499096 CET44549879201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:41.560144901 CET50053445192.168.2.4139.91.173.104
                              Jan 14, 2025 20:55:41.565063953 CET44550053139.91.173.104192.168.2.4
                              Jan 14, 2025 20:55:41.565187931 CET50053445192.168.2.4139.91.173.104
                              Jan 14, 2025 20:55:41.565272093 CET50053445192.168.2.4139.91.173.104
                              Jan 14, 2025 20:55:41.565529108 CET50054445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:55:41.570159912 CET44550053139.91.173.104192.168.2.4
                              Jan 14, 2025 20:55:41.570401907 CET44550054139.91.173.1192.168.2.4
                              Jan 14, 2025 20:55:41.570461035 CET50054445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:55:41.570502043 CET50054445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:55:41.570627928 CET50053445192.168.2.4139.91.173.104
                              Jan 14, 2025 20:55:41.570843935 CET50055445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:55:41.575431108 CET44550054139.91.173.1192.168.2.4
                              Jan 14, 2025 20:55:41.575495958 CET50054445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:55:41.575720072 CET44550055139.91.173.1192.168.2.4
                              Jan 14, 2025 20:55:41.575784922 CET50055445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:55:41.575824976 CET50055445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:55:41.580681086 CET44550055139.91.173.1192.168.2.4
                              Jan 14, 2025 20:55:41.778908014 CET50056445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:41.783910036 CET44550056178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:41.784143925 CET50056445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:41.784145117 CET50056445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:55:41.789051056 CET44550056178.11.215.1192.168.2.4
                              Jan 14, 2025 20:55:42.792999029 CET445499074.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:42.793102026 CET49907445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:42.793207884 CET49907445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:42.793207884 CET49907445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:42.798015118 CET445499074.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:42.798027039 CET445499074.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:43.435113907 CET50057445192.168.2.4219.55.22.232
                              Jan 14, 2025 20:55:43.440005064 CET44550057219.55.22.232192.168.2.4
                              Jan 14, 2025 20:55:43.440078020 CET50057445192.168.2.4219.55.22.232
                              Jan 14, 2025 20:55:43.440121889 CET50057445192.168.2.4219.55.22.232
                              Jan 14, 2025 20:55:43.440382004 CET50058445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:55:43.445306063 CET44550058219.55.22.1192.168.2.4
                              Jan 14, 2025 20:55:43.445378065 CET50058445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:55:43.445380926 CET44550057219.55.22.232192.168.2.4
                              Jan 14, 2025 20:55:43.445405006 CET50058445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:55:43.445434093 CET50057445192.168.2.4219.55.22.232
                              Jan 14, 2025 20:55:43.445858002 CET50059445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:55:43.450331926 CET44550058219.55.22.1192.168.2.4
                              Jan 14, 2025 20:55:43.450443029 CET50058445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:55:43.450658083 CET44550059219.55.22.1192.168.2.4
                              Jan 14, 2025 20:55:43.450721979 CET50059445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:55:43.450743914 CET50059445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:55:43.455523014 CET44550059219.55.22.1192.168.2.4
                              Jan 14, 2025 20:55:43.794428110 CET50060445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:43.799320936 CET44550060201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:43.799537897 CET50060445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:43.799638987 CET50060445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:55:43.804533005 CET44550060201.115.177.1192.168.2.4
                              Jan 14, 2025 20:55:44.806716919 CET44549934181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:44.807434082 CET49934445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:44.807522058 CET49934445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:44.807557106 CET49934445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:44.813708067 CET44549934181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:44.813720942 CET44549934181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:45.185283899 CET50061445192.168.2.4155.106.11.244
                              Jan 14, 2025 20:55:45.190150976 CET44550061155.106.11.244192.168.2.4
                              Jan 14, 2025 20:55:45.190294027 CET50061445192.168.2.4155.106.11.244
                              Jan 14, 2025 20:55:45.190335989 CET50061445192.168.2.4155.106.11.244
                              Jan 14, 2025 20:55:45.190629959 CET50062445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:55:45.195420027 CET44550062155.106.11.1192.168.2.4
                              Jan 14, 2025 20:55:45.195482969 CET50062445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:55:45.195513964 CET50062445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:55:45.195846081 CET50063445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:55:45.196100950 CET44550061155.106.11.244192.168.2.4
                              Jan 14, 2025 20:55:45.199592113 CET44550061155.106.11.244192.168.2.4
                              Jan 14, 2025 20:55:45.199723005 CET50061445192.168.2.4155.106.11.244
                              Jan 14, 2025 20:55:45.200365067 CET44550062155.106.11.1192.168.2.4
                              Jan 14, 2025 20:55:45.200418949 CET50062445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:55:45.200732946 CET44550063155.106.11.1192.168.2.4
                              Jan 14, 2025 20:55:45.200799942 CET50063445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:55:45.204020977 CET50063445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:55:45.208832979 CET44550063155.106.11.1192.168.2.4
                              Jan 14, 2025 20:55:45.794215918 CET50064445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:45.799104929 CET445500644.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:45.799194098 CET50064445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:45.802628994 CET50064445192.168.2.44.143.32.1
                              Jan 14, 2025 20:55:45.807503939 CET445500644.143.32.1192.168.2.4
                              Jan 14, 2025 20:55:46.825787067 CET50065445192.168.2.4178.151.38.198
                              Jan 14, 2025 20:55:46.830686092 CET44550065178.151.38.198192.168.2.4
                              Jan 14, 2025 20:55:46.830760956 CET50065445192.168.2.4178.151.38.198
                              Jan 14, 2025 20:55:46.830854893 CET50065445192.168.2.4178.151.38.198
                              Jan 14, 2025 20:55:46.831001997 CET50066445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:55:46.835840940 CET44550065178.151.38.198192.168.2.4
                              Jan 14, 2025 20:55:46.835860014 CET44550066178.151.38.1192.168.2.4
                              Jan 14, 2025 20:55:46.835908890 CET50065445192.168.2.4178.151.38.198
                              Jan 14, 2025 20:55:46.835982084 CET50066445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:55:46.835982084 CET50066445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:55:46.836267948 CET50067445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:55:46.840886116 CET44550066178.151.38.1192.168.2.4
                              Jan 14, 2025 20:55:46.840938091 CET50066445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:55:46.841084957 CET44550067178.151.38.1192.168.2.4
                              Jan 14, 2025 20:55:46.841144085 CET50067445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:55:46.841182947 CET50067445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:55:46.845933914 CET44550067178.151.38.1192.168.2.4
                              Jan 14, 2025 20:55:46.853156090 CET445499598.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:46.853254080 CET49959445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:46.853254080 CET49959445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:46.853364944 CET49959445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:46.858175993 CET445499598.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:46.858187914 CET445499598.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:47.809778929 CET50068445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:47.814651966 CET44550068181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:47.814729929 CET50068445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:47.814749956 CET50068445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:55:47.819535971 CET44550068181.68.205.1192.168.2.4
                              Jan 14, 2025 20:55:48.357105017 CET50069445192.168.2.4185.83.41.188
                              Jan 14, 2025 20:55:48.361970901 CET44550069185.83.41.188192.168.2.4
                              Jan 14, 2025 20:55:48.362103939 CET50069445192.168.2.4185.83.41.188
                              Jan 14, 2025 20:55:48.362194061 CET50069445192.168.2.4185.83.41.188
                              Jan 14, 2025 20:55:48.362538099 CET50070445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:55:48.367198944 CET44550069185.83.41.188192.168.2.4
                              Jan 14, 2025 20:55:48.367294073 CET50069445192.168.2.4185.83.41.188
                              Jan 14, 2025 20:55:48.367476940 CET44550070185.83.41.1192.168.2.4
                              Jan 14, 2025 20:55:48.367573977 CET50070445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:55:48.367759943 CET50070445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:55:48.368228912 CET50071445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:55:48.372548103 CET44550070185.83.41.1192.168.2.4
                              Jan 14, 2025 20:55:48.372613907 CET50070445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:55:48.373078108 CET44550071185.83.41.1192.168.2.4
                              Jan 14, 2025 20:55:48.373141050 CET50071445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:55:48.373172045 CET50071445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:55:48.377959967 CET44550071185.83.41.1192.168.2.4
                              Jan 14, 2025 20:55:48.821981907 CET44549982125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:48.822113037 CET49982445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:48.822170019 CET49982445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:48.822236061 CET49982445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:48.826987028 CET44549982125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:48.827011108 CET44549982125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:49.779619932 CET50072445192.168.2.4182.204.40.232
                              Jan 14, 2025 20:55:49.784507990 CET44550072182.204.40.232192.168.2.4
                              Jan 14, 2025 20:55:49.784627914 CET50072445192.168.2.4182.204.40.232
                              Jan 14, 2025 20:55:49.784651995 CET50072445192.168.2.4182.204.40.232
                              Jan 14, 2025 20:55:49.784823895 CET50073445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:55:49.789649010 CET44550073182.204.40.1192.168.2.4
                              Jan 14, 2025 20:55:49.789747000 CET50073445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:55:49.789796114 CET44550072182.204.40.232192.168.2.4
                              Jan 14, 2025 20:55:49.789844036 CET50072445192.168.2.4182.204.40.232
                              Jan 14, 2025 20:55:49.790115118 CET50074445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:55:49.790164948 CET50073445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:55:49.794984102 CET44550074182.204.40.1192.168.2.4
                              Jan 14, 2025 20:55:49.795007944 CET44550073182.204.40.1192.168.2.4
                              Jan 14, 2025 20:55:49.795066118 CET50074445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:55:49.795118093 CET50074445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:55:49.795206070 CET50073445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:55:49.799952030 CET44550074182.204.40.1192.168.2.4
                              Jan 14, 2025 20:55:49.856637001 CET50075445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:49.861417055 CET445500758.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:49.861525059 CET50075445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:49.861577034 CET50075445192.168.2.48.127.54.1
                              Jan 14, 2025 20:55:49.866343021 CET445500758.127.54.1192.168.2.4
                              Jan 14, 2025 20:55:50.837583065 CET4455000643.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:50.837690115 CET50006445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:50.837788105 CET50006445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:50.837788105 CET50006445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:50.842611074 CET4455000643.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:50.842628956 CET4455000643.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:51.107225895 CET50076445192.168.2.4121.178.111.150
                              Jan 14, 2025 20:55:51.112131119 CET44550076121.178.111.150192.168.2.4
                              Jan 14, 2025 20:55:51.112215996 CET50076445192.168.2.4121.178.111.150
                              Jan 14, 2025 20:55:51.112247944 CET50076445192.168.2.4121.178.111.150
                              Jan 14, 2025 20:55:51.112381935 CET50077445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:55:51.117944002 CET44550076121.178.111.150192.168.2.4
                              Jan 14, 2025 20:55:51.118004084 CET50076445192.168.2.4121.178.111.150
                              Jan 14, 2025 20:55:51.118314981 CET44550077121.178.111.1192.168.2.4
                              Jan 14, 2025 20:55:51.118367910 CET50077445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:55:51.118397951 CET50077445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:55:51.118837118 CET50078445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:55:51.123542070 CET44550077121.178.111.1192.168.2.4
                              Jan 14, 2025 20:55:51.123596907 CET50077445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:55:51.123704910 CET44550078121.178.111.1192.168.2.4
                              Jan 14, 2025 20:55:51.123771906 CET50078445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:55:51.123800993 CET50078445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:55:51.128531933 CET44550078121.178.111.1192.168.2.4
                              Jan 14, 2025 20:55:51.825560093 CET50079445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:51.830483913 CET44550079125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:51.830607891 CET50079445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:51.830607891 CET50079445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:55:51.835489988 CET44550079125.172.29.1192.168.2.4
                              Jan 14, 2025 20:55:52.357680082 CET50080445192.168.2.4165.212.249.24
                              Jan 14, 2025 20:55:52.362854004 CET44550080165.212.249.24192.168.2.4
                              Jan 14, 2025 20:55:52.362942934 CET50080445192.168.2.4165.212.249.24
                              Jan 14, 2025 20:55:52.363295078 CET50080445192.168.2.4165.212.249.24
                              Jan 14, 2025 20:55:52.363437891 CET50081445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:55:52.368253946 CET44550080165.212.249.24192.168.2.4
                              Jan 14, 2025 20:55:52.368269920 CET44550080165.212.249.24192.168.2.4
                              Jan 14, 2025 20:55:52.368285894 CET44550081165.212.249.1192.168.2.4
                              Jan 14, 2025 20:55:52.368339062 CET50080445192.168.2.4165.212.249.24
                              Jan 14, 2025 20:55:52.368372917 CET50081445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:55:52.368612051 CET50081445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:55:52.369069099 CET50082445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:55:52.373430967 CET44550081165.212.249.1192.168.2.4
                              Jan 14, 2025 20:55:52.373532057 CET50081445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:55:52.373886108 CET44550082165.212.249.1192.168.2.4
                              Jan 14, 2025 20:55:52.373946905 CET50082445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:55:52.373980999 CET50082445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:55:52.378808022 CET44550082165.212.249.1192.168.2.4
                              Jan 14, 2025 20:55:52.854008913 CET44550029208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:52.854065895 CET50029445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:52.854101896 CET50029445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:52.854166985 CET50029445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:52.858937979 CET44550029208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:52.858952999 CET44550029208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:53.195667982 CET44550035132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:53.195867062 CET50035445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:53.196029902 CET50035445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:53.196216106 CET50035445192.168.2.4132.173.19.1
                              Jan 14, 2025 20:55:53.200817108 CET44550035132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:53.201040030 CET44550035132.173.19.1192.168.2.4
                              Jan 14, 2025 20:55:53.263448954 CET50083445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:55:53.268594027 CET44550083132.173.19.2192.168.2.4
                              Jan 14, 2025 20:55:53.268707037 CET50083445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:55:53.268822908 CET50083445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:55:53.269207001 CET50084445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:55:53.273858070 CET44550083132.173.19.2192.168.2.4
                              Jan 14, 2025 20:55:53.273930073 CET50083445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:55:53.274061918 CET44550084132.173.19.2192.168.2.4
                              Jan 14, 2025 20:55:53.274125099 CET50084445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:55:53.274183035 CET50084445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:55:53.278970003 CET44550084132.173.19.2192.168.2.4
                              Jan 14, 2025 20:55:53.513602972 CET50085445192.168.2.474.197.101.231
                              Jan 14, 2025 20:55:53.518460035 CET4455008574.197.101.231192.168.2.4
                              Jan 14, 2025 20:55:53.518542051 CET50085445192.168.2.474.197.101.231
                              Jan 14, 2025 20:55:53.518575907 CET50085445192.168.2.474.197.101.231
                              Jan 14, 2025 20:55:53.518695116 CET50086445192.168.2.474.197.101.1
                              Jan 14, 2025 20:55:53.523582935 CET4455008674.197.101.1192.168.2.4
                              Jan 14, 2025 20:55:53.523665905 CET50086445192.168.2.474.197.101.1
                              Jan 14, 2025 20:55:53.523675919 CET4455008574.197.101.231192.168.2.4
                              Jan 14, 2025 20:55:53.523739100 CET50085445192.168.2.474.197.101.231
                              Jan 14, 2025 20:55:53.523766994 CET50086445192.168.2.474.197.101.1
                              Jan 14, 2025 20:55:53.524075031 CET50087445192.168.2.474.197.101.1
                              Jan 14, 2025 20:55:53.528784990 CET4455008674.197.101.1192.168.2.4
                              Jan 14, 2025 20:55:53.528850079 CET50086445192.168.2.474.197.101.1
                              Jan 14, 2025 20:55:53.528933048 CET4455008774.197.101.1192.168.2.4
                              Jan 14, 2025 20:55:53.528985977 CET50087445192.168.2.474.197.101.1
                              Jan 14, 2025 20:55:53.529007912 CET50087445192.168.2.474.197.101.1
                              Jan 14, 2025 20:55:53.533888102 CET4455008774.197.101.1192.168.2.4
                              Jan 14, 2025 20:55:53.843337059 CET50088445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:53.848212957 CET4455008843.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:53.851869106 CET50088445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:53.854125977 CET50088445192.168.2.443.147.188.1
                              Jan 14, 2025 20:55:53.858915091 CET4455008843.147.188.1192.168.2.4
                              Jan 14, 2025 20:55:54.591535091 CET50089445192.168.2.424.228.248.149
                              Jan 14, 2025 20:55:54.596390963 CET4455008924.228.248.149192.168.2.4
                              Jan 14, 2025 20:55:54.596510887 CET50089445192.168.2.424.228.248.149
                              Jan 14, 2025 20:55:54.596528053 CET50089445192.168.2.424.228.248.149
                              Jan 14, 2025 20:55:54.596679926 CET50090445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:54.601443052 CET4455008924.228.248.149192.168.2.4
                              Jan 14, 2025 20:55:54.601496935 CET4455009024.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:54.601511955 CET50089445192.168.2.424.228.248.149
                              Jan 14, 2025 20:55:54.601567030 CET50090445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:54.601680040 CET50090445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:54.602125883 CET50091445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:54.606626034 CET4455009024.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:54.606692076 CET50090445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:54.606975079 CET4455009124.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:54.607043028 CET50091445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:54.607103109 CET50091445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:54.611996889 CET4455009124.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:54.890254974 CET44550039146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:54.890388966 CET50039445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:54.890448093 CET50039445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:54.890503883 CET50039445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:54.895380974 CET44550039146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:54.895412922 CET44550039146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:55.089757919 CET44550040113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:55.089983940 CET50040445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:55.090163946 CET50040445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:55.090348959 CET50040445192.168.2.4113.105.176.1
                              Jan 14, 2025 20:55:55.095010996 CET44550040113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:55.095221996 CET44550040113.105.176.1192.168.2.4
                              Jan 14, 2025 20:55:55.157397985 CET50092445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:55:55.162307978 CET44550092113.105.176.2192.168.2.4
                              Jan 14, 2025 20:55:55.162420034 CET50092445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:55:55.162549019 CET50092445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:55:55.162997007 CET50093445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:55:55.167382956 CET44550092113.105.176.2192.168.2.4
                              Jan 14, 2025 20:55:55.167455912 CET50092445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:55:55.167918921 CET44550093113.105.176.2192.168.2.4
                              Jan 14, 2025 20:55:55.167992115 CET50093445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:55:55.168128967 CET50093445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:55:55.172916889 CET44550093113.105.176.2192.168.2.4
                              Jan 14, 2025 20:55:55.612962961 CET50094445192.168.2.4152.54.236.231
                              Jan 14, 2025 20:55:55.617888927 CET44550094152.54.236.231192.168.2.4
                              Jan 14, 2025 20:55:55.617966890 CET50094445192.168.2.4152.54.236.231
                              Jan 14, 2025 20:55:55.618069887 CET50094445192.168.2.4152.54.236.231
                              Jan 14, 2025 20:55:55.618246078 CET50095445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:55:55.622982979 CET44550094152.54.236.231192.168.2.4
                              Jan 14, 2025 20:55:55.623043060 CET50094445192.168.2.4152.54.236.231
                              Jan 14, 2025 20:55:55.623111963 CET44550095152.54.236.1192.168.2.4
                              Jan 14, 2025 20:55:55.623251915 CET50095445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:55:55.623471022 CET50095445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:55:55.628588915 CET44550095152.54.236.1192.168.2.4
                              Jan 14, 2025 20:55:55.628635883 CET50095445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:55:55.631725073 CET50096445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:55:55.636636972 CET44550096152.54.236.1192.168.2.4
                              Jan 14, 2025 20:55:55.636713028 CET50096445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:55:55.640218973 CET50096445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:55:55.645081043 CET44550096152.54.236.1192.168.2.4
                              Jan 14, 2025 20:55:55.856925011 CET50097445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:55.861730099 CET44550097208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:55.861845970 CET50097445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:55.861936092 CET50097445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:55:55.866760969 CET44550097208.220.165.1192.168.2.4
                              Jan 14, 2025 20:55:56.036469936 CET4455009124.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:56.036714077 CET50091445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:56.036813021 CET50091445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:56.036847115 CET50091445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:56.041672945 CET4455009124.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:56.041703939 CET4455009124.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:56.544785976 CET50098445192.168.2.494.253.178.125
                              Jan 14, 2025 20:55:56.549628019 CET4455009894.253.178.125192.168.2.4
                              Jan 14, 2025 20:55:56.549829006 CET50098445192.168.2.494.253.178.125
                              Jan 14, 2025 20:55:56.549899101 CET50098445192.168.2.494.253.178.125
                              Jan 14, 2025 20:55:56.550050020 CET50099445192.168.2.494.253.178.1
                              Jan 14, 2025 20:55:56.554845095 CET4455009894.253.178.125192.168.2.4
                              Jan 14, 2025 20:55:56.554862022 CET4455009994.253.178.1192.168.2.4
                              Jan 14, 2025 20:55:56.554935932 CET50098445192.168.2.494.253.178.125
                              Jan 14, 2025 20:55:56.554980993 CET50099445192.168.2.494.253.178.1
                              Jan 14, 2025 20:55:56.555036068 CET50099445192.168.2.494.253.178.1
                              Jan 14, 2025 20:55:56.555341959 CET50100445192.168.2.494.253.178.1
                              Jan 14, 2025 20:55:56.560173988 CET4455009994.253.178.1192.168.2.4
                              Jan 14, 2025 20:55:56.560189009 CET4455010094.253.178.1192.168.2.4
                              Jan 14, 2025 20:55:56.560204029 CET4455009994.253.178.1192.168.2.4
                              Jan 14, 2025 20:55:56.560251951 CET50100445192.168.2.494.253.178.1
                              Jan 14, 2025 20:55:56.560276985 CET50099445192.168.2.494.253.178.1
                              Jan 14, 2025 20:55:56.560347080 CET50100445192.168.2.494.253.178.1
                              Jan 14, 2025 20:55:56.565095901 CET4455010094.253.178.1192.168.2.4
                              Jan 14, 2025 20:55:56.902029037 CET44550043136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:56.902127981 CET50043445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:56.902163029 CET50043445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:56.902221918 CET50043445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:56.906896114 CET44550043136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:56.907021046 CET44550043136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:57.138617039 CET445500441.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:57.138778925 CET50044445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:57.138829947 CET50044445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:57.138891935 CET50044445192.168.2.41.43.74.1
                              Jan 14, 2025 20:55:57.143733978 CET445500441.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:57.143765926 CET445500441.43.74.1192.168.2.4
                              Jan 14, 2025 20:55:57.200735092 CET50101445192.168.2.41.43.74.2
                              Jan 14, 2025 20:55:57.205598116 CET445501011.43.74.2192.168.2.4
                              Jan 14, 2025 20:55:57.205780983 CET50101445192.168.2.41.43.74.2
                              Jan 14, 2025 20:55:57.205831051 CET50101445192.168.2.41.43.74.2
                              Jan 14, 2025 20:55:57.206310034 CET50102445192.168.2.41.43.74.2
                              Jan 14, 2025 20:55:57.210741043 CET445501011.43.74.2192.168.2.4
                              Jan 14, 2025 20:55:57.210803986 CET50101445192.168.2.41.43.74.2
                              Jan 14, 2025 20:55:57.211126089 CET445501021.43.74.2192.168.2.4
                              Jan 14, 2025 20:55:57.211184978 CET50102445192.168.2.41.43.74.2
                              Jan 14, 2025 20:55:57.211226940 CET50102445192.168.2.41.43.74.2
                              Jan 14, 2025 20:55:57.215972900 CET445501021.43.74.2192.168.2.4
                              Jan 14, 2025 20:55:57.419738054 CET50103445192.168.2.433.17.254.193
                              Jan 14, 2025 20:55:57.424618006 CET4455010333.17.254.193192.168.2.4
                              Jan 14, 2025 20:55:57.424830914 CET50103445192.168.2.433.17.254.193
                              Jan 14, 2025 20:55:57.425009012 CET50103445192.168.2.433.17.254.193
                              Jan 14, 2025 20:55:57.425095081 CET50104445192.168.2.433.17.254.1
                              Jan 14, 2025 20:55:57.429805994 CET4455010333.17.254.193192.168.2.4
                              Jan 14, 2025 20:55:57.429872036 CET4455010433.17.254.1192.168.2.4
                              Jan 14, 2025 20:55:57.429872990 CET50103445192.168.2.433.17.254.193
                              Jan 14, 2025 20:55:57.429939032 CET50104445192.168.2.433.17.254.1
                              Jan 14, 2025 20:55:57.430043936 CET50104445192.168.2.433.17.254.1
                              Jan 14, 2025 20:55:57.430560112 CET50105445192.168.2.433.17.254.1
                              Jan 14, 2025 20:55:57.435091972 CET4455010433.17.254.1192.168.2.4
                              Jan 14, 2025 20:55:57.435189009 CET50104445192.168.2.433.17.254.1
                              Jan 14, 2025 20:55:57.435332060 CET4455010533.17.254.1192.168.2.4
                              Jan 14, 2025 20:55:57.435478926 CET50105445192.168.2.433.17.254.1
                              Jan 14, 2025 20:55:57.435700893 CET50105445192.168.2.433.17.254.1
                              Jan 14, 2025 20:55:57.440501928 CET4455010533.17.254.1192.168.2.4
                              Jan 14, 2025 20:55:57.903774023 CET50106445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:57.908679008 CET44550106146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:57.908803940 CET50106445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:57.908881903 CET50106445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:55:57.914313078 CET44550106146.123.105.1192.168.2.4
                              Jan 14, 2025 20:55:58.248199940 CET50107445192.168.2.4180.213.67.63
                              Jan 14, 2025 20:55:58.253149986 CET44550107180.213.67.63192.168.2.4
                              Jan 14, 2025 20:55:58.253371954 CET50107445192.168.2.4180.213.67.63
                              Jan 14, 2025 20:55:58.253371954 CET50107445192.168.2.4180.213.67.63
                              Jan 14, 2025 20:55:58.253633976 CET50108445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:55:58.258353949 CET44550107180.213.67.63192.168.2.4
                              Jan 14, 2025 20:55:58.258420944 CET44550108180.213.67.1192.168.2.4
                              Jan 14, 2025 20:55:58.258428097 CET50107445192.168.2.4180.213.67.63
                              Jan 14, 2025 20:55:58.258548975 CET50108445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:55:58.258594036 CET50108445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:55:58.258892059 CET50109445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:55:58.263602972 CET44550108180.213.67.1192.168.2.4
                              Jan 14, 2025 20:55:58.263768911 CET44550109180.213.67.1192.168.2.4
                              Jan 14, 2025 20:55:58.263780117 CET50108445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:55:58.263844013 CET50109445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:55:58.263868093 CET50109445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:55:58.268682003 CET44550109180.213.67.1192.168.2.4
                              Jan 14, 2025 20:55:58.919764042 CET44550047156.2.142.1192.168.2.4
                              Jan 14, 2025 20:55:58.919926882 CET50047445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:58.919996977 CET50047445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:58.920058012 CET50047445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:55:58.924773932 CET44550047156.2.142.1192.168.2.4
                              Jan 14, 2025 20:55:58.924813986 CET44550047156.2.142.1192.168.2.4
                              Jan 14, 2025 20:55:59.013581991 CET50111445192.168.2.4155.202.46.164
                              Jan 14, 2025 20:55:59.018485069 CET44550111155.202.46.164192.168.2.4
                              Jan 14, 2025 20:55:59.018639088 CET50111445192.168.2.4155.202.46.164
                              Jan 14, 2025 20:55:59.018687010 CET50111445192.168.2.4155.202.46.164
                              Jan 14, 2025 20:55:59.018989086 CET50112445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:55:59.023601055 CET44550111155.202.46.164192.168.2.4
                              Jan 14, 2025 20:55:59.023672104 CET50111445192.168.2.4155.202.46.164
                              Jan 14, 2025 20:55:59.023833036 CET44550112155.202.46.1192.168.2.4
                              Jan 14, 2025 20:55:59.023900032 CET50112445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:55:59.023930073 CET50112445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:55:59.024404049 CET50113445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:55:59.028918982 CET44550112155.202.46.1192.168.2.4
                              Jan 14, 2025 20:55:59.028990984 CET50112445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:55:59.029263973 CET44550113155.202.46.1192.168.2.4
                              Jan 14, 2025 20:55:59.029340982 CET50113445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:55:59.029383898 CET50113445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:55:59.034229040 CET44550113155.202.46.1192.168.2.4
                              Jan 14, 2025 20:55:59.044513941 CET50114445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:59.049385071 CET4455011424.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:59.049468994 CET50114445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:59.049506903 CET50114445192.168.2.424.228.248.1
                              Jan 14, 2025 20:55:59.054384947 CET4455011424.228.248.1192.168.2.4
                              Jan 14, 2025 20:55:59.154284954 CET4455004841.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:59.154364109 CET50048445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:59.154426098 CET50048445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:59.154489994 CET50048445192.168.2.441.25.189.1
                              Jan 14, 2025 20:55:59.159265995 CET4455004841.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:59.159276009 CET4455004841.25.189.1192.168.2.4
                              Jan 14, 2025 20:55:59.216222048 CET50115445192.168.2.441.25.189.2
                              Jan 14, 2025 20:55:59.221278906 CET4455011541.25.189.2192.168.2.4
                              Jan 14, 2025 20:55:59.221383095 CET50115445192.168.2.441.25.189.2
                              Jan 14, 2025 20:55:59.221400976 CET50115445192.168.2.441.25.189.2
                              Jan 14, 2025 20:55:59.221774101 CET50116445192.168.2.441.25.189.2
                              Jan 14, 2025 20:55:59.226450920 CET4455011541.25.189.2192.168.2.4
                              Jan 14, 2025 20:55:59.226501942 CET50115445192.168.2.441.25.189.2
                              Jan 14, 2025 20:55:59.226584911 CET4455011641.25.189.2192.168.2.4
                              Jan 14, 2025 20:55:59.226644039 CET50116445192.168.2.441.25.189.2
                              Jan 14, 2025 20:55:59.226689100 CET50116445192.168.2.441.25.189.2
                              Jan 14, 2025 20:55:59.231426001 CET4455011641.25.189.2192.168.2.4
                              Jan 14, 2025 20:55:59.905961037 CET50118445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:59.912098885 CET44550118136.131.128.1192.168.2.4
                              Jan 14, 2025 20:55:59.912178040 CET50118445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:59.912236929 CET50118445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:55:59.918162107 CET44550118136.131.128.1192.168.2.4
                              Jan 14, 2025 20:56:00.453746080 CET4455011424.228.248.1192.168.2.4
                              Jan 14, 2025 20:56:00.453819990 CET50114445192.168.2.424.228.248.1
                              Jan 14, 2025 20:56:00.453851938 CET50114445192.168.2.424.228.248.1
                              Jan 14, 2025 20:56:00.453874111 CET50114445192.168.2.424.228.248.1
                              Jan 14, 2025 20:56:00.458981037 CET4455011424.228.248.1192.168.2.4
                              Jan 14, 2025 20:56:00.458996058 CET4455011424.228.248.1192.168.2.4
                              Jan 14, 2025 20:56:00.512937069 CET50121445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:00.518832922 CET4455012124.228.248.2192.168.2.4
                              Jan 14, 2025 20:56:00.518925905 CET50121445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:00.518970966 CET50121445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:00.519368887 CET50122445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:00.524188042 CET4455012124.228.248.2192.168.2.4
                              Jan 14, 2025 20:56:00.524249077 CET4455012224.228.248.2192.168.2.4
                              Jan 14, 2025 20:56:00.524279118 CET4455012124.228.248.2192.168.2.4
                              Jan 14, 2025 20:56:00.524322987 CET50122445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:00.524352074 CET50121445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:00.524353981 CET50122445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:00.529194117 CET4455012224.228.248.2192.168.2.4
                              Jan 14, 2025 20:56:00.964972019 CET44550051195.5.125.1192.168.2.4
                              Jan 14, 2025 20:56:00.965038061 CET50051445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:56:00.965084076 CET50051445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:56:00.965128899 CET50051445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:56:00.969824076 CET44550051195.5.125.1192.168.2.4
                              Jan 14, 2025 20:56:00.969877005 CET44550051195.5.125.1192.168.2.4
                              Jan 14, 2025 20:56:01.166160107 CET4455005221.20.144.1192.168.2.4
                              Jan 14, 2025 20:56:01.166312933 CET50052445192.168.2.421.20.144.1
                              Jan 14, 2025 20:56:01.166387081 CET50052445192.168.2.421.20.144.1
                              Jan 14, 2025 20:56:01.166450977 CET50052445192.168.2.421.20.144.1
                              Jan 14, 2025 20:56:01.171348095 CET4455005221.20.144.1192.168.2.4
                              Jan 14, 2025 20:56:01.171381950 CET4455005221.20.144.1192.168.2.4
                              Jan 14, 2025 20:56:01.232075930 CET50125445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:01.237041950 CET4455012521.20.144.2192.168.2.4
                              Jan 14, 2025 20:56:01.237159967 CET50125445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:01.237205029 CET50125445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:01.237454891 CET50126445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:01.242288113 CET4455012621.20.144.2192.168.2.4
                              Jan 14, 2025 20:56:01.242356062 CET50126445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:01.242435932 CET50126445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:01.242446899 CET4455012521.20.144.2192.168.2.4
                              Jan 14, 2025 20:56:01.242516041 CET50125445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:01.247225046 CET4455012621.20.144.2192.168.2.4
                              Jan 14, 2025 20:56:01.934920073 CET50134445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:56:01.939821005 CET44550134156.2.142.1192.168.2.4
                              Jan 14, 2025 20:56:01.939902067 CET50134445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:56:01.939959049 CET50134445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:56:01.944751978 CET44550134156.2.142.1192.168.2.4
                              Jan 14, 2025 20:56:02.915541887 CET44550055139.91.173.1192.168.2.4
                              Jan 14, 2025 20:56:02.915630102 CET50055445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:56:02.918586016 CET50055445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:56:02.918669939 CET50055445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:56:02.923371077 CET44550055139.91.173.1192.168.2.4
                              Jan 14, 2025 20:56:02.923456907 CET44550055139.91.173.1192.168.2.4
                              Jan 14, 2025 20:56:03.167812109 CET44550056178.11.215.1192.168.2.4
                              Jan 14, 2025 20:56:03.167910099 CET50056445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:56:03.167969942 CET50056445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:56:03.168026924 CET50056445192.168.2.4178.11.215.1
                              Jan 14, 2025 20:56:03.172796965 CET44550056178.11.215.1192.168.2.4
                              Jan 14, 2025 20:56:03.172852039 CET44550056178.11.215.1192.168.2.4
                              Jan 14, 2025 20:56:03.231662989 CET50153445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:03.236510992 CET44550153178.11.215.2192.168.2.4
                              Jan 14, 2025 20:56:03.236597061 CET50153445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:03.236614943 CET50153445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:03.236958027 CET50154445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:03.241786003 CET44550153178.11.215.2192.168.2.4
                              Jan 14, 2025 20:56:03.241822004 CET44550154178.11.215.2192.168.2.4
                              Jan 14, 2025 20:56:03.241854906 CET50153445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:03.241880894 CET50154445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:03.241903067 CET50154445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:03.246723890 CET44550154178.11.215.2192.168.2.4
                              Jan 14, 2025 20:56:03.966016054 CET50166445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:56:03.970851898 CET44550166195.5.125.1192.168.2.4
                              Jan 14, 2025 20:56:03.970917940 CET50166445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:56:03.970941067 CET50166445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:56:03.975671053 CET44550166195.5.125.1192.168.2.4
                              Jan 14, 2025 20:56:04.888861895 CET44550059219.55.22.1192.168.2.4
                              Jan 14, 2025 20:56:04.890033960 CET50059445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:56:04.890033960 CET50059445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:56:04.890121937 CET50059445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:56:04.894923925 CET44550059219.55.22.1192.168.2.4
                              Jan 14, 2025 20:56:04.894954920 CET44550059219.55.22.1192.168.2.4
                              Jan 14, 2025 20:56:05.152251005 CET44550060201.115.177.1192.168.2.4
                              Jan 14, 2025 20:56:05.152352095 CET50060445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:56:05.152381897 CET50060445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:56:05.152420044 CET50060445192.168.2.4201.115.177.1
                              Jan 14, 2025 20:56:05.157295942 CET44550060201.115.177.1192.168.2.4
                              Jan 14, 2025 20:56:05.157326937 CET44550060201.115.177.1192.168.2.4
                              Jan 14, 2025 20:56:05.216238976 CET50185445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:05.223043919 CET44550185201.115.177.2192.168.2.4
                              Jan 14, 2025 20:56:05.223133087 CET50185445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:05.223212957 CET50185445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:05.223572969 CET50186445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:05.228432894 CET44550185201.115.177.2192.168.2.4
                              Jan 14, 2025 20:56:05.228466034 CET44550186201.115.177.2192.168.2.4
                              Jan 14, 2025 20:56:05.228488922 CET50185445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:05.228528976 CET50186445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:05.228555918 CET50186445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:05.233383894 CET44550186201.115.177.2192.168.2.4
                              Jan 14, 2025 20:56:05.919362068 CET50201445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:56:05.924189091 CET44550201139.91.173.1192.168.2.4
                              Jan 14, 2025 20:56:05.924276114 CET50201445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:56:05.924300909 CET50201445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:56:05.929147005 CET44550201139.91.173.1192.168.2.4
                              Jan 14, 2025 20:56:06.556267023 CET44550063155.106.11.1192.168.2.4
                              Jan 14, 2025 20:56:06.558485031 CET50063445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:56:06.558485985 CET50063445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:56:06.558485985 CET50063445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:56:06.563452005 CET44550063155.106.11.1192.168.2.4
                              Jan 14, 2025 20:56:06.563513041 CET44550063155.106.11.1192.168.2.4
                              Jan 14, 2025 20:56:07.150754929 CET445500644.143.32.1192.168.2.4
                              Jan 14, 2025 20:56:07.150820971 CET50064445192.168.2.44.143.32.1
                              Jan 14, 2025 20:56:07.150849104 CET50064445192.168.2.44.143.32.1
                              Jan 14, 2025 20:56:07.150888920 CET50064445192.168.2.44.143.32.1
                              Jan 14, 2025 20:56:07.155735016 CET445500644.143.32.1192.168.2.4
                              Jan 14, 2025 20:56:07.155750990 CET445500644.143.32.1192.168.2.4
                              Jan 14, 2025 20:56:07.216171026 CET50235445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:07.221256971 CET445502354.143.32.2192.168.2.4
                              Jan 14, 2025 20:56:07.221380949 CET50235445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:07.221704960 CET50235445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:07.221704960 CET50236445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:07.226587057 CET445502364.143.32.2192.168.2.4
                              Jan 14, 2025 20:56:07.226620913 CET445502354.143.32.2192.168.2.4
                              Jan 14, 2025 20:56:07.226676941 CET50236445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:07.226696968 CET50235445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:07.226697922 CET50236445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:07.231592894 CET445502364.143.32.2192.168.2.4
                              Jan 14, 2025 20:56:07.903615952 CET50258445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:56:07.908600092 CET44550258219.55.22.1192.168.2.4
                              Jan 14, 2025 20:56:07.908749104 CET50258445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:56:07.911849022 CET50258445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:56:07.916748047 CET44550258219.55.22.1192.168.2.4
                              Jan 14, 2025 20:56:08.248177052 CET44550067178.151.38.1192.168.2.4
                              Jan 14, 2025 20:56:08.249769926 CET50067445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:56:08.249769926 CET50067445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:56:08.249769926 CET50067445192.168.2.4178.151.38.1
                              Jan 14, 2025 20:56:08.254756927 CET44550067178.151.38.1192.168.2.4
                              Jan 14, 2025 20:56:08.254779100 CET44550067178.151.38.1192.168.2.4
                              Jan 14, 2025 20:56:09.170051098 CET44550068181.68.205.1192.168.2.4
                              Jan 14, 2025 20:56:09.170170069 CET50068445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:56:09.170206070 CET50068445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:56:09.170239925 CET50068445192.168.2.4181.68.205.1
                              Jan 14, 2025 20:56:09.175112963 CET44550068181.68.205.1192.168.2.4
                              Jan 14, 2025 20:56:09.175144911 CET44550068181.68.205.1192.168.2.4
                              Jan 14, 2025 20:56:09.231755972 CET50306445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:09.236733913 CET44550306181.68.205.2192.168.2.4
                              Jan 14, 2025 20:56:09.236913919 CET50306445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:09.237127066 CET50306445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:09.237795115 CET50308445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:09.242067099 CET44550306181.68.205.2192.168.2.4
                              Jan 14, 2025 20:56:09.242162943 CET50306445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:09.242912054 CET44550308181.68.205.2192.168.2.4
                              Jan 14, 2025 20:56:09.242983103 CET50308445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:09.243010998 CET50308445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:09.248258114 CET44550308181.68.205.2192.168.2.4
                              Jan 14, 2025 20:56:09.559835911 CET50327445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:56:09.564820051 CET44550327155.106.11.1192.168.2.4
                              Jan 14, 2025 20:56:09.564934015 CET50327445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:56:09.564985037 CET50327445192.168.2.4155.106.11.1
                              Jan 14, 2025 20:56:09.569946051 CET44550327155.106.11.1192.168.2.4
                              Jan 14, 2025 20:56:09.729798079 CET44550071185.83.41.1192.168.2.4
                              Jan 14, 2025 20:56:09.729927063 CET50071445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:56:09.729960918 CET50071445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:56:09.730043888 CET50071445192.168.2.4185.83.41.1
                              Jan 14, 2025 20:56:09.735824108 CET44550071185.83.41.1192.168.2.4
                              Jan 14, 2025 20:56:09.735836029 CET44550071185.83.41.1192.168.2.4
                              Jan 14, 2025 20:56:11.166484118 CET44550074182.204.40.1192.168.2.4
                              Jan 14, 2025 20:56:11.166697979 CET50074445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:56:11.249982119 CET445500758.127.54.1192.168.2.4
                              Jan 14, 2025 20:56:11.251878977 CET50075445192.168.2.48.127.54.1
                              Jan 14, 2025 20:56:12.118508101 CET50134445192.168.2.4156.2.142.1
                              Jan 14, 2025 20:56:12.118571997 CET50102445192.168.2.41.43.74.2
                              Jan 14, 2025 20:56:12.118762970 CET50126445192.168.2.421.20.144.2
                              Jan 14, 2025 20:56:12.118804932 CET50093445192.168.2.4113.105.176.2
                              Jan 14, 2025 20:56:12.118854046 CET50088445192.168.2.443.147.188.1
                              Jan 14, 2025 20:56:12.118894100 CET50186445192.168.2.4201.115.177.2
                              Jan 14, 2025 20:56:12.119007111 CET50154445192.168.2.4178.11.215.2
                              Jan 14, 2025 20:56:12.119013071 CET50236445192.168.2.44.143.32.2
                              Jan 14, 2025 20:56:12.119158983 CET50074445192.168.2.4182.204.40.1
                              Jan 14, 2025 20:56:12.119185925 CET50075445192.168.2.48.127.54.1
                              Jan 14, 2025 20:56:12.119205952 CET50078445192.168.2.4121.178.111.1
                              Jan 14, 2025 20:56:12.119235992 CET50079445192.168.2.4125.172.29.1
                              Jan 14, 2025 20:56:12.119283915 CET50082445192.168.2.4165.212.249.1
                              Jan 14, 2025 20:56:12.119303942 CET50084445192.168.2.4132.173.19.2
                              Jan 14, 2025 20:56:12.119319916 CET50087445192.168.2.474.197.101.1
                              Jan 14, 2025 20:56:12.119434118 CET50096445192.168.2.4152.54.236.1
                              Jan 14, 2025 20:56:12.119486094 CET50100445192.168.2.494.253.178.1
                              Jan 14, 2025 20:56:12.119550943 CET50106445192.168.2.4146.123.105.1
                              Jan 14, 2025 20:56:12.119575024 CET50109445192.168.2.4180.213.67.1
                              Jan 14, 2025 20:56:12.119596004 CET50097445192.168.2.4208.220.165.1
                              Jan 14, 2025 20:56:12.119596004 CET50105445192.168.2.433.17.254.1
                              Jan 14, 2025 20:56:12.119612932 CET50113445192.168.2.4155.202.46.1
                              Jan 14, 2025 20:56:12.119628906 CET50116445192.168.2.441.25.189.2
                              Jan 14, 2025 20:56:12.119653940 CET50118445192.168.2.4136.131.128.1
                              Jan 14, 2025 20:56:12.119723082 CET50122445192.168.2.424.228.248.2
                              Jan 14, 2025 20:56:12.119826078 CET50166445192.168.2.4195.5.125.1
                              Jan 14, 2025 20:56:12.119858027 CET50201445192.168.2.4139.91.173.1
                              Jan 14, 2025 20:56:12.119997025 CET50258445192.168.2.4219.55.22.1
                              Jan 14, 2025 20:56:12.120085001 CET50308445192.168.2.4181.68.205.2
                              Jan 14, 2025 20:56:12.120280981 CET50327445192.168.2.4155.106.11.1
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 20:55:06.085912943 CET5925153192.168.2.41.1.1.1
                              Jan 14, 2025 20:55:06.099577904 CET53592511.1.1.1192.168.2.4
                              Jan 14, 2025 20:55:23.395180941 CET138138192.168.2.4192.168.2.255
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 14, 2025 20:55:06.085912943 CET192.168.2.41.1.1.10xb1c2Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 14, 2025 20:55:06.099577904 CET1.1.1.1192.168.2.40xb1c2No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                              Jan 14, 2025 20:55:06.099577904 CET1.1.1.1192.168.2.40xb1c2No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                              • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449730104.16.167.228807028C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 20:55:06.112283945 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 20:55:06.606933117 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 19:55:06 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90202e85d8ac0f5b-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.449731104.16.167.228807164C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 20:55:06.762994051 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 20:55:07.277864933 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 19:55:07 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90202e8a0a308c41-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.449753104.16.167.228802676C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 20:55:08.930411100 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 20:55:09.416944027 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 19:55:09 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90202e975b554310-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:14:55:04
                              Start date:14/01/2025
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll"
                              Imagebase:0x6a0000
                              File size:126'464 bytes
                              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:1
                              Start time:14:55:04
                              Start date:14/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:14:55:04
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:14:55:05
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\6KJ3FjgeLv.dll,PlayGame
                              Imagebase:0xaf0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:14:55:05
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",#1
                              Imagebase:0xaf0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:14:55:05
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:56246E2D641CD17BE2918ADBBFCC29D7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1711072603.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1731154615.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1711217728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1711217728.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:6
                              Start time:14:55:05
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe -m security
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:56246E2D641CD17BE2918ADBBFCC29D7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2360409683.0000000001E73000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2360409683.0000000001E73000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1718570812.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2360722246.0000000002395000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2360722246.0000000002395000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1718691548.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1718691548.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:14:55:06
                              Start date:14/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:46666A9A0D8DF0DF785D38F39ACCE1E1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1729995708.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 90%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:8
                              Start time:14:55:08
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\6KJ3FjgeLv.dll",PlayGame
                              Imagebase:0xaf0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:9
                              Start time:14:55:08
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x7ff7699e0000
                              File size:3'723'264 bytes
                              MD5 hash:56246E2D641CD17BE2918ADBBFCC29D7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1739870438.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1749488758.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1749705209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1749705209.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1740032845.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1740032845.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:10
                              Start time:14:55:08
                              Start date:14/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:46666A9A0D8DF0DF785D38F39ACCE1E1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1747527147.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1748476153.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:71.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:64.9%
                                Total number of Nodes:37
                                Total number of Limit Nodes:9

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                • CreateProcessA.KERNELBASE ref: 00407EE8
                                • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1731119749.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1731102040.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731136374.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731202185.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4281112323-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1731119749.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1731102040.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731136374.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731202185.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000005.00000002.1731119749.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1731102040.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731136374.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731202185.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1731119749.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1731102040.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731136374.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731202185.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1731119749.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1731102040.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731136374.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731154615.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731202185.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1731288102.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Execution Graph

                                Execution Coverage:34.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:35
                                Total number of Limit Nodes:2

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2359559516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2359542385.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359575656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359641207.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359654665.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000006.00000002.2359559516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2359542385.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359575656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359641207.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359654665.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2359559516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2359542385.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359575656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359641207.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359654665.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2359559516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2359542385.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359575656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359641207.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359654665.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4072214828-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000006.00000002.2359559516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2359542385.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359575656.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359591297.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359627016.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359641207.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359654665.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2359745595.0000000000826000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                APIs
                                • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID: /../$/..\$\../$\..\
                                • API String ID: 3510742995-3885502717
                                • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                • API String ID: 2238633743-2459060434
                                • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$ManagerStart
                                • String ID: cmd.exe /c "%s"
                                • API String ID: 1485051382-955883872
                                • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow$memcpy
                                • String ID:
                                • API String ID: 1881450474-3916222277
                                • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                • String ID: WANACRY!
                                • API String ID: 283026544-1240840912
                                • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID: $Q;@
                                • API String ID: 2382887404-262343263
                                • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-3916222277
                                • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                APIs
                                • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$FreeProcessfree
                                • String ID:
                                • API String ID: 3428986607-0
                                • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                APIs
                                • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ContextCryptRelease
                                • String ID:
                                • API String ID: 829835001-0
                                • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                APIs
                                  • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                • API String ID: 2238633743-1294736154
                                • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: %s%s$%s%s%s$:$\
                                • API String ID: 0-1100577047
                                • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                APIs
                                • __p___argv.MSVCRT(0040F538), ref: 00402040
                                • strcmp.MSVCRT(?), ref: 0040204B
                                • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                  • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                  • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                  • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                  • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                  • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                • API String ID: 1074704982-2844324180
                                • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                APIs
                                • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                • strlen.MSVCRT(?), ref: 004011A7
                                • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                • String ID: 0@$Software\$WanaCrypt0r
                                • API String ID: 865909632-3421300005
                                • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                • String ID: %s\Intel$%s\ProgramData
                                • API String ID: 3806094219-198707228
                                • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                APIs
                                  • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                  • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                • SetLastError.KERNEL32(0000045A), ref: 00402430
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                • API String ID: 1900561814-3657104962
                                • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                APIs
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                • String ID: %s\%s
                                • API String ID: 1036847564-4073750446
                                • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                APIs
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                • CloseHandle.KERNEL32(?), ref: 004010EC
                                • CloseHandle.KERNEL32(?), ref: 004010F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                • String ID: D
                                • API String ID: 786732093-2746444292
                                • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                APIs
                                • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                • __p__fmode.MSVCRT ref: 004077FC
                                • __p__commode.MSVCRT ref: 0040780A
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                • String ID:
                                • API String ID: 3626615345-0
                                • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                APIs
                                • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                  • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                • String ID:
                                • API String ID: 2141228402-0
                                • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                APIs
                                • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Read$realloc
                                • String ID: ?!@
                                • API String ID: 1241503663-708128716
                                • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: rand$wcslen$ComputerNamesrand
                                • String ID:
                                • API String ID: 3058258771-0
                                • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                APIs
                                • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                • String ID:
                                • API String ID: 2935503933-0
                                • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                APIs
                                • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                • Sleep.KERNEL32(000003E8), ref: 00401F40
                                • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandleMutexOpenSleepsprintf
                                • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                • API String ID: 2780352083-2959021817
                                • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-0
                                • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                APIs
                                • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                • fclose.MSVCRT(00000000), ref: 00401058
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: fclosefopenfreadfwrite
                                • String ID: c.wnry
                                • API String ID: 4000964834-3240288721
                                • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                • String ID:
                                • API String ID: 2811923685-0
                                • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                APIs
                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Pointer$??2@Create
                                • String ID:
                                • API String ID: 1331958074-0
                                • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                APIs
                                • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_stricmp
                                • String ID: P!@
                                • API String ID: 1278613211-1774101457
                                • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                APIs
                                • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFilestrcmp
                                • String ID: c.wnry
                                • API String ID: 3324900478-3240288721
                                • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                APIs
                                • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??3@CloseHandle
                                • String ID: $l@
                                • API String ID: 3816424416-2140230165
                                • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                APIs
                                • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                Memory Dump Source
                                • Source File: 00000007.00000002.1730638456.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1730610937.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730659508.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730678634.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1730702599.0000000000516000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$Leave$Entermemcpy
                                • String ID:
                                • API String ID: 3435569088-0
                                • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65