Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9nNO3SHiV1.dll

Overview

General Information

Sample name:9nNO3SHiV1.dll
renamed because original name is a hash value
Original sample name:64416e602428cc5a299a015a0fa9f1a6.dll
Analysis ID:1591280
MD5:64416e602428cc5a299a015a0fa9f1a6
SHA1:f8b6a8cc3405b348147b5ac432ceef11d5e84ae4
SHA256:2f533e5c3c70b96ca7155942b51a20cde0abe2f955d67fa6b436a8dda664f746
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7552 cmdline: loaddll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7604 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7628 cmdline: rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7652 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 11D821B793DBFC5AC4CCE2752A77F6C6)
          • tasksche.exe (PID: 7792 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 7F7CCAA16FB15EB1C7399D422F8363E8)
    • rundll32.exe (PID: 7612 cmdline: rundll32.exe C:\Users\user\Desktop\9nNO3SHiV1.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7868 cmdline: rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7884 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 11D821B793DBFC5AC4CCE2752A77F6C6)
        • tasksche.exe (PID: 7972 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 7F7CCAA16FB15EB1C7399D422F8363E8)
  • mssecsvc.exe (PID: 7700 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 11D821B793DBFC5AC4CCE2752A77F6C6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
9nNO3SHiV1.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    9nNO3SHiV1.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    9nNO3SHiV1.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000007.00000000.1759205215.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000009.00000002.1778682068.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            6.2.mssecsvc.exe.1fee084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            6.2.mssecsvc.exe.25138c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            10.2.tasksche.exe.400000.0.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              10.2.tasksche.exe.400000.0.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              10.2.tasksche.exe.400000.0.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:09:30.112700+010020315153Misc activity104.16.166.22880192.168.2.449730TCP
              2025-01-14T21:09:30.805919+010020315153Misc activity104.16.166.22880192.168.2.449731TCP
              2025-01-14T21:09:32.952786+010020315153Misc activity104.16.166.22880192.168.2.449750TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:09:29.601964+010020242911A Network Trojan was detected192.168.2.4513661.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:09:30.112594+010020242981A Network Trojan was detected192.168.2.449730104.16.166.22880TCP
              2025-01-14T21:09:30.805251+010020242981A Network Trojan was detected192.168.2.449731104.16.166.22880TCP
              2025-01-14T21:09:32.952199+010020242981A Network Trojan was detected192.168.2.449750104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:09:30.112594+010020242991A Network Trojan was detected192.168.2.449730104.16.166.22880TCP
              2025-01-14T21:09:30.805251+010020242991A Network Trojan was detected192.168.2.449731104.16.166.22880TCP
              2025-01-14T21:09:32.952199+010020242991A Network Trojan was detected192.168.2.449750104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:09:30.112594+010020243011A Network Trojan was detected192.168.2.449730104.16.166.22880TCP
              2025-01-14T21:09:30.805251+010020243011A Network Trojan was detected192.168.2.449731104.16.166.22880TCP
              2025-01-14T21:09:32.952199+010020243011A Network Trojan was detected192.168.2.449750104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:09:30.112594+010020243021A Network Trojan was detected192.168.2.449730104.16.166.22880TCP
              2025-01-14T21:09:30.805251+010020243021A Network Trojan was detected192.168.2.449731104.16.166.22880TCP
              2025-01-14T21:09:32.952199+010020243021A Network Trojan was detected192.168.2.449750104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T21:09:30.112594+010028033043Unknown Traffic192.168.2.449730104.16.166.22880TCP
              2025-01-14T21:09:30.805251+010028033043Unknown Traffic192.168.2.449731104.16.166.22880TCP
              2025-01-14T21:09:32.952199+010028033043Unknown Traffic192.168.2.449750104.16.166.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 9nNO3SHiV1.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 100%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
              Source: 9nNO3SHiV1.dllVirustotal: Detection: 91%Perma Link
              Source: 9nNO3SHiV1.dllReversingLabs: Detection: 94%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: 9nNO3SHiV1.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: 9nNO3SHiV1.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49730 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49730 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49730 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49730 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49750 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49750 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49750 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49750 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49731 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49731 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49731 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49731 -> 104.16.166.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:09:30 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020439acb7a7287-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:09:30 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020439f1c1f8c51-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:09:32 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902043ac7aa7de95-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficTCP traffic: 192.168.2.4:63767 -> 162.159.36.2:53
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.4:51366 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49750 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49731 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.4:49750
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.4:49731
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.124
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.124
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.124
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.1
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.124
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.1
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.1
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.1
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.1
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.1
              Source: unknownTCP traffic detected without corresponding DNS query: 209.206.153.1
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.203
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.203
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.203
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.1
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.203
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.1
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.1
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.1
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.1
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.1
              Source: unknownTCP traffic detected without corresponding DNS query: 200.22.137.1
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.152
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.152
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.152
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.152
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 169.136.170.1
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.248
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.248
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.248
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.1
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.1
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.248
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.1
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.1
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.1
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.1
              Source: unknownTCP traffic detected without corresponding DNS query: 119.53.67.1
              Source: unknownTCP traffic detected without corresponding DNS query: 162.197.230.156
              Source: unknownTCP traffic detected without corresponding DNS query: 162.197.230.156
              Source: unknownTCP traffic detected without corresponding DNS query: 162.197.230.156
              Source: unknownTCP traffic detected without corresponding DNS query: 162.197.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 162.197.230.156
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: 9nNO3SHiV1.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 00000006.00000002.2393390178.0000000000C7C000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1779359962.0000000000BB7000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1779359962.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000009.00000002.1779359962.0000000000BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
              Source: mssecsvc.exe, 00000005.00000002.1762164663.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/FI
              Source: mssecsvc.exe, 00000005.00000002.1762164663.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Q
              Source: mssecsvc.exe, 00000005.00000002.1762164663.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/R
              Source: mssecsvc.exe, 00000006.00000002.2393390178.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/S
              Source: mssecsvc.exe, 00000009.00000002.1779359962.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/U-
              Source: mssecsvc.exe, 00000009.00000002.1779359962.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/W-
              Source: mssecsvc.exe, 00000006.00000002.2393390178.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Z
              Source: mssecsvc.exe, 00000006.00000002.2392636506.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000005.00000002.1762164663.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.coma
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
              Source: Yara matchFile source: 9nNO3SHiV1.dll, type: SAMPLE
              Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2020128.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.254596c.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2522948.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1ffd104.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.254596c.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1ff90a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.1ffd104.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2522948.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.2020128.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.251e8e8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.25138c8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1778682068.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1747953358.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1769162765.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.1740276276.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.1740425126.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1748094778.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1778988524.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1769336762.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2393946101.0000000001FFD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2394278077.0000000002522000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7652, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7700, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7884, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: 9nNO3SHiV1.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9nNO3SHiV1.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1fee084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.25138c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.2020128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2020128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.2020128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.254596c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.254596c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.254596c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.2522948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2522948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.2522948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1ffd104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1ffd104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1ffd104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.254596c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.254596c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.254596c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.1ff90a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1ff90a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.1ffd104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.1ffd104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.2522948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2522948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.2020128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.2020128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.2020128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.251e8e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.251e8e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.25138c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.25138c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000000.1759205215.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.1777970579.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.1777294397.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.1740425126.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1748094778.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1778988524.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1769336762.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2393946101.0000000001FFD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.2394278077.0000000002522000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
              Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
              Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
              Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: 9nNO3SHiV1.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: 9nNO3SHiV1.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9nNO3SHiV1.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1fee084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.25138c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.2020128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2020128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.2020128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.254596c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.254596c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.254596c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.2522948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2522948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.2522948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1ffd104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1ffd104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1ffd104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.254596c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.254596c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.254596c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1fee084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.1ff90a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1ff90a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.1ffd104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.1ffd104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.2522948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2522948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.2020128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.2020128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.2020128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.251e8e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.251e8e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.25138c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.25138c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000000.1759205215.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.1777970579.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.1777294397.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.1740425126.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1748094778.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1778988524.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1769336762.0000000000710000.00000080.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2393946101.0000000001FFD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.2394278077.0000000002522000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000002.1777970579.000000000040E000.00000008.00000001.01000000.00000007.sdmp, 9nNO3SHiV1.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7560:120:WilError_03
              Source: 9nNO3SHiV1.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\9nNO3SHiV1.dll,PlayGame
              Source: 9nNO3SHiV1.dllVirustotal: Detection: 91%
              Source: 9nNO3SHiV1.dllReversingLabs: Detection: 94%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\9nNO3SHiV1.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\9nNO3SHiV1.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: 9nNO3SHiV1.dllStatic file information: File size 5267459 > 1048576
              Source: 9nNO3SHiV1.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7748Thread sleep count: 95 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7748Thread sleep time: -190000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7768Thread sleep count: 126 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7768Thread sleep count: 50 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 7748Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000009.00000002.1779359962.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWU
              Source: mssecsvc.exe, 00000005.00000002.1762164663.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.1762164663.0000000000DF7000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000003.1754988375.0000000000C92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2393390178.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2393390178.0000000000C92000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1779359962.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000009.00000002.1779359962.0000000000BB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8%
              Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591280 Sample: 9nNO3SHiV1.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.102 unknown unknown 12->45 47 192.168.2.103 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              9nNO3SHiV1.dll92%VirustotalBrowse
              9nNO3SHiV1.dll95%ReversingLabsWin32.Ransomware.WannaCry
              9nNO3SHiV1.dll100%AviraTR/AD.WannaCry.sewvt
              9nNO3SHiV1.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/AD.WannaCry.sewvt
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)100%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.coma0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.166.228
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9nNO3SHiV1.dllfalse
                    high
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Rmssecsvc.exe, 00000005.00000002.1762164663.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Smssecsvc.exe, 00000006.00000002.2393390178.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/FImssecsvc.exe, 00000005.00000002.1762164663.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Qmssecsvc.exe, 00000005.00000002.1762164663.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comamssecsvc.exe, 00000005.00000002.1762164663.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000009.00000002.1779359962.0000000000BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Zmssecsvc.exe, 00000006.00000002.2393390178.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/U-mssecsvc.exe, 00000009.00000002.1779359962.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/W-mssecsvc.exe, 00000009.00000002.1779359962.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000006.00000002.2392636506.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    200.22.137.203
                                    unknownChile
                                    2715FundacaoCarlosChagasFilhodeAmparoaPesquisaBRfalse
                                    161.211.120.1
                                    unknownUnited States
                                    14513DMACCUSfalse
                                    207.63.162.31
                                    unknownUnited States
                                    6325ILLINOIS-CENTURYUSfalse
                                    119.53.67.2
                                    unknownChina
                                    4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                    209.206.153.1
                                    unknownUnited States
                                    22561CENTURYLINK-LEGACY-LIGHTCOREUSfalse
                                    209.206.153.2
                                    unknownUnited States
                                    22561CENTURYLINK-LEGACY-LIGHTCOREUSfalse
                                    59.249.2.1
                                    unknownChina
                                    2516KDDIKDDICORPORATIONJPfalse
                                    209.206.153.124
                                    unknownUnited States
                                    22561CENTURYLINK-LEGACY-LIGHTCOREUSfalse
                                    169.136.170.1
                                    unknownUnited States
                                    10122BIGO-AS-APBIGOTECHNOLOGYPTELTDSGfalse
                                    169.136.170.2
                                    unknownUnited States
                                    10122BIGO-AS-APBIGOTECHNOLOGYPTELTDSGfalse
                                    161.211.120.117
                                    unknownUnited States
                                    14513DMACCUSfalse
                                    80.208.52.1
                                    unknownDenmark
                                    44869FIBIA-P-SDKfalse
                                    119.53.67.1
                                    unknownChina
                                    4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                    73.80.3.78
                                    unknownUnited States
                                    7922COMCAST-7922USfalse
                                    80.208.52.2
                                    unknownDenmark
                                    44869FIBIA-P-SDKfalse
                                    164.101.196.12
                                    unknownUnited States
                                    4758NICNET-VSNL-BOARDER-APNationalInformaticsCentreINfalse
                                    120.231.161.246
                                    unknownChina
                                    56040CMNET-GUANGDONG-APChinaMobilecommunicationscorporationfalse
                                    27.11.108.236
                                    unknownChina
                                    4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                    213.182.137.180
                                    unknownGermany
                                    8881VERSATELDEfalse
                                    128.149.196.1
                                    unknownUnited States
                                    127JPL-AS127USfalse
                                    212.144.65.2
                                    unknownGermany
                                    3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                                    212.144.65.1
                                    unknownGermany
                                    3209VODANETInternationalIP-BackboneofVodafoneDEfalse
                                    IP
                                    10.31.243.1
                                    192.168.2.148
                                    192.168.2.149
                                    192.168.2.146
                                    192.168.2.147
                                    192.168.2.140
                                    192.168.2.141
                                    192.168.2.144
                                    192.168.2.145
                                    192.168.2.142
                                    192.168.2.143
                                    192.168.2.159
                                    192.168.2.157
                                    192.168.2.158
                                    192.168.2.151
                                    192.168.2.152
                                    192.168.2.150
                                    192.168.2.155
                                    192.168.2.156
                                    192.168.2.153
                                    192.168.2.154
                                    192.168.2.126
                                    192.168.2.247
                                    192.168.2.127
                                    192.168.2.248
                                    192.168.2.124
                                    192.168.2.245
                                    192.168.2.125
                                    192.168.2.246
                                    192.168.2.128
                                    192.168.2.249
                                    192.168.2.129
                                    192.168.2.240
                                    192.168.2.122
                                    192.168.2.243
                                    10.31.243.204
                                    192.168.2.123
                                    192.168.2.244
                                    192.168.2.120
                                    192.168.2.241
                                    192.168.2.121
                                    192.168.2.242
                                    192.168.2.97
                                    192.168.2.137
                                    192.168.2.96
                                    192.168.2.138
                                    192.168.2.99
                                    192.168.2.135
                                    192.168.2.98
                                    192.168.2.136
                                    192.168.2.139
                                    192.168.2.250
                                    192.168.2.130
                                    192.168.2.251
                                    192.168.2.91
                                    192.168.2.90
                                    192.168.2.93
                                    192.168.2.133
                                    192.168.2.254
                                    192.168.2.92
                                    192.168.2.134
                                    192.168.2.95
                                    192.168.2.131
                                    192.168.2.252
                                    192.168.2.94
                                    192.168.2.132
                                    192.168.2.253
                                    192.168.2.104
                                    192.168.2.225
                                    192.168.2.105
                                    192.168.2.226
                                    192.168.2.102
                                    192.168.2.223
                                    192.168.2.103
                                    192.168.2.224
                                    192.168.2.108
                                    192.168.2.229
                                    192.168.2.109
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1591280
                                    Start date and time:2025-01-14 21:08:31 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 45s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:14
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:9nNO3SHiV1.dll
                                    renamed because original name is a hash value
                                    Original Sample Name:64416e602428cc5a299a015a0fa9f1a6.dll
                                    Detection:MAL
                                    Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .dll
                                    • Stop behavior analysis, all processes terminated
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 199.232.210.172, 2.17.190.73, 4.245.163.56, 13.107.246.45
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target tasksche.exe, PID 7792 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    15:09:31API Interceptor1x Sleep call for process: loaddll32.exe modified
                                    15:10:04API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comk6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                    • 104.16.166.228
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                    • 104.16.166.228
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                    • 104.16.167.228
                                    LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.166.228
                                    qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.167.228
                                    1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                    • 104.16.166.228
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ILLINOIS-CENTURYUSfrosty.sh4.elfGet hashmaliciousMiraiBrowse
                                    • 66.99.157.254
                                    armv5l.elfGet hashmaliciousUnknownBrowse
                                    • 216.124.116.48
                                    Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                                    • 209.175.222.100
                                    miori.sh4.elfGet hashmaliciousUnknownBrowse
                                    • 64.107.193.160
                                    fuckunix.spc.elfGet hashmaliciousMiraiBrowse
                                    • 72.3.66.3
                                    Hilix.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 163.191.229.134
                                    botx.ppc.elfGet hashmaliciousMiraiBrowse
                                    • 216.124.190.162
                                    la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 163.191.7.238
                                    loligang.x86.elfGet hashmaliciousMiraiBrowse
                                    • 216.124.190.158
                                    arm7.elfGet hashmaliciousUnknownBrowse
                                    • 209.175.42.136
                                    DMACCUSmiori.ppc.elfGet hashmaliciousUnknownBrowse
                                    • 161.210.87.175
                                    nklarm7.elfGet hashmaliciousUnknownBrowse
                                    • 161.211.65.62
                                    bot.ppc.elfGet hashmaliciousMiraiBrowse
                                    • 161.211.165.175
                                    b3astmode.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 161.210.40.124
                                    Owari.x86.elfGet hashmaliciousUnknownBrowse
                                    • 161.210.40.196
                                    arm5.elfGet hashmaliciousUnknownBrowse
                                    • 161.210.22.141
                                    nklx86.elfGet hashmaliciousUnknownBrowse
                                    • 161.211.165.164
                                    mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 161.210.6.58
                                    botnet.arm5.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 161.210.69.137
                                    x86.elfGet hashmaliciousMiraiBrowse
                                    • 161.211.41.70
                                    FundacaoCarlosChagasFilhodeAmparoaPesquisaBRx86.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 200.156.110.221
                                    nshmpsl.elfGet hashmaliciousMiraiBrowse
                                    • 200.156.110.209
                                    la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                    • 200.156.88.222
                                    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 200.20.254.97
                                    armv5l.elfGet hashmaliciousMiraiBrowse
                                    • 161.79.106.187
                                    jmggnxeedy.elfGet hashmaliciousUnknownBrowse
                                    • 139.82.244.52
                                    i686.elfGet hashmaliciousUnknownBrowse
                                    • 146.164.92.58
                                    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 146.164.179.193
                                    splppc.elfGet hashmaliciousUnknownBrowse
                                    • 200.22.71.181
                                    xd.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 200.22.126.231
                                    CHINA169-BACKBONECHINAUNICOMChina169BackboneCNmlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                    • 39.74.29.1
                                    mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                    • 116.178.208.121
                                    Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                    • 61.167.78.49
                                    meth10.elfGet hashmaliciousMiraiBrowse
                                    • 60.16.183.30
                                    meth3.elfGet hashmaliciousMiraiBrowse
                                    • 157.2.250.223
                                    meth8.elfGet hashmaliciousMiraiBrowse
                                    • 183.189.239.112
                                    arm4.elfGet hashmaliciousUnknownBrowse
                                    • 113.230.132.37
                                    ppc.elfGet hashmaliciousUnknownBrowse
                                    • 183.188.114.225
                                    m68k.elfGet hashmaliciousUnknownBrowse
                                    • 221.215.129.62
                                    i686.elfGet hashmaliciousUnknownBrowse
                                    • 42.49.158.242
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\WINDOWS\qeriuwjhrf (copy)zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                      zyeX8bTkky.dllGet hashmaliciousWannacryBrowse
                                        qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                          1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                            qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                              stN592INV6.exeGet hashmaliciousWannacryBrowse
                                                onq54JS79W.exeGet hashmaliciousWannacryBrowse
                                                  mbXvGlj2dR.dllGet hashmaliciousWannacryBrowse
                                                    MSNRf9dZ63.exeGet hashmaliciousWannacryBrowse
                                                      7Qu8thR7WW.dllGet hashmaliciousWannacry, VirutBrowse
                                                        C:\Windows\tasksche.exezbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                                          zyeX8bTkky.dllGet hashmaliciousWannacryBrowse
                                                            qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                                              1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                                                qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                                                  stN592INV6.exeGet hashmaliciousWannacryBrowse
                                                                    onq54JS79W.exeGet hashmaliciousWannacryBrowse
                                                                      mbXvGlj2dR.dllGet hashmaliciousWannacryBrowse
                                                                        MSNRf9dZ63.exeGet hashmaliciousWannacryBrowse
                                                                          7Qu8thR7WW.dllGet hashmaliciousWannacry, VirutBrowse
                                                                            Process:C:\Windows\mssecsvc.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):3514368
                                                                            Entropy (8bit):7.996072890929898
                                                                            Encrypted:true
                                                                            SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                                                            MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                            SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                                                            SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                                                            SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 100%
                                                                            Joe Sandbox View:
                                                                            • Filename: zbRmQrzaHY.dll, Detection: malicious, Browse
                                                                            • Filename: zyeX8bTkky.dll, Detection: malicious, Browse
                                                                            • Filename: qt680eucI4.dll, Detection: malicious, Browse
                                                                            • Filename: 1w3BDu68Sg.dll, Detection: malicious, Browse
                                                                            • Filename: qCc1a4w5YZ.exe, Detection: malicious, Browse
                                                                            • Filename: stN592INV6.exe, Detection: malicious, Browse
                                                                            • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                                                            • Filename: mbXvGlj2dR.dll, Detection: malicious, Browse
                                                                            • Filename: MSNRf9dZ63.exe, Detection: malicious, Browse
                                                                            • Filename: 7Qu8thR7WW.dll, Detection: malicious, Browse
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Windows\mssecsvc.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):3514368
                                                                            Entropy (8bit):7.996072890929898
                                                                            Encrypted:true
                                                                            SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                                                            MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                            SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                                                            SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                                                            SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                                                            Malicious:true
                                                                            Yara Hits:
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                                            Antivirus:
                                                                            • Antivirus: Avira, Detection: 100%
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            • Antivirus: ReversingLabs, Detection: 100%
                                                                            Joe Sandbox View:
                                                                            • Filename: zbRmQrzaHY.dll, Detection: malicious, Browse
                                                                            • Filename: zyeX8bTkky.dll, Detection: malicious, Browse
                                                                            • Filename: qt680eucI4.dll, Detection: malicious, Browse
                                                                            • Filename: 1w3BDu68Sg.dll, Detection: malicious, Browse
                                                                            • Filename: qCc1a4w5YZ.exe, Detection: malicious, Browse
                                                                            • Filename: stN592INV6.exe, Detection: malicious, Browse
                                                                            • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                                                            • Filename: mbXvGlj2dR.dll, Detection: malicious, Browse
                                                                            • Filename: MSNRf9dZ63.exe, Detection: malicious, Browse
                                                                            • Filename: 7Qu8thR7WW.dll, Detection: malicious, Browse
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Entropy (8bit):6.41262820005552
                                                                            TrID:
                                                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                                                            • DOS Executable Generic (2002/1) 0.20%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:9nNO3SHiV1.dll
                                                                            File size:5'267'459 bytes
                                                                            MD5:64416e602428cc5a299a015a0fa9f1a6
                                                                            SHA1:f8b6a8cc3405b348147b5ac432ceef11d5e84ae4
                                                                            SHA256:2f533e5c3c70b96ca7155942b51a20cde0abe2f955d67fa6b436a8dda664f746
                                                                            SHA512:03fddfe4546646a880e387a71a662b1f406073a03e67402febadd8836b2c7ec962183a59f2e6700edca44d6fc8ca975e313ffd39bc989a7aa72b7bd5e777a771
                                                                            SSDEEP:98304:BDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:BDqPe1Cxcxk3ZAEUadzR8yc4H
                                                                            TLSH:97363394622CB2FCF0440EB44463896BB7B33C6967BA5E1F9BC086670D43B5BAFD0641
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                                            Icon Hash:7ae282899bbab082
                                                                            Entrypoint:0x100011e9
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x10000000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                                            DLL Characteristics:
                                                                            Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                                            Instruction
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            push ebx
                                                                            mov ebx, dword ptr [ebp+08h]
                                                                            push esi
                                                                            mov esi, dword ptr [ebp+0Ch]
                                                                            push edi
                                                                            mov edi, dword ptr [ebp+10h]
                                                                            test esi, esi
                                                                            jne 00007F6CBCB6F21Bh
                                                                            cmp dword ptr [10003140h], 00000000h
                                                                            jmp 00007F6CBCB6F238h
                                                                            cmp esi, 01h
                                                                            je 00007F6CBCB6F217h
                                                                            cmp esi, 02h
                                                                            jne 00007F6CBCB6F234h
                                                                            mov eax, dword ptr [10003150h]
                                                                            test eax, eax
                                                                            je 00007F6CBCB6F21Bh
                                                                            push edi
                                                                            push esi
                                                                            push ebx
                                                                            call eax
                                                                            test eax, eax
                                                                            je 00007F6CBCB6F21Eh
                                                                            push edi
                                                                            push esi
                                                                            push ebx
                                                                            call 00007F6CBCB6F12Ah
                                                                            test eax, eax
                                                                            jne 00007F6CBCB6F216h
                                                                            xor eax, eax
                                                                            jmp 00007F6CBCB6F260h
                                                                            push edi
                                                                            push esi
                                                                            push ebx
                                                                            call 00007F6CBCB6EFDCh
                                                                            cmp esi, 01h
                                                                            mov dword ptr [ebp+0Ch], eax
                                                                            jne 00007F6CBCB6F21Eh
                                                                            test eax, eax
                                                                            jne 00007F6CBCB6F249h
                                                                            push edi
                                                                            push eax
                                                                            push ebx
                                                                            call 00007F6CBCB6F106h
                                                                            test esi, esi
                                                                            je 00007F6CBCB6F217h
                                                                            cmp esi, 03h
                                                                            jne 00007F6CBCB6F238h
                                                                            push edi
                                                                            push esi
                                                                            push ebx
                                                                            call 00007F6CBCB6F0F5h
                                                                            test eax, eax
                                                                            jne 00007F6CBCB6F215h
                                                                            and dword ptr [ebp+0Ch], eax
                                                                            cmp dword ptr [ebp+0Ch], 00000000h
                                                                            je 00007F6CBCB6F223h
                                                                            mov eax, dword ptr [10003150h]
                                                                            test eax, eax
                                                                            je 00007F6CBCB6F21Ah
                                                                            push edi
                                                                            push esi
                                                                            push ebx
                                                                            call eax
                                                                            mov dword ptr [ebp+0Ch], eax
                                                                            mov eax, dword ptr [ebp+0Ch]
                                                                            pop edi
                                                                            pop esi
                                                                            pop ebx
                                                                            pop ebp
                                                                            retn 000Ch
                                                                            jmp dword ptr [10002028h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            Programming Language:
                                                                            • [ C ] VS98 (6.0) build 8168
                                                                            • [C++] VS98 (6.0) build 8168
                                                                            • [RES] VS98 (6.0) cvtres build 1720
                                                                            • [LNK] VS98 (6.0) imp/exp build 8168
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .rsrc0x40000x5000600x50100003bd1374e0ebec857db04b16bde9cacfunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            W0x40600x500000dataEnglishUnited States0.8770942687988281
                                                                            DLLImport
                                                                            KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                                            MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                                            NameOrdinalAddress
                                                                            PlayGame10x10001114
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States
                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                            2025-01-14T21:09:29.601964+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.4513661.1.1.153UDP
                                                                            2025-01-14T21:09:30.112594+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.112594+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449730104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.112594+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449730104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.112594+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449730104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.112594+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449730104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.112700+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.449730TCP
                                                                            2025-01-14T21:09:30.805251+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449731104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.805251+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449731104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.805251+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449731104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.805251+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449731104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.805251+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449731104.16.166.22880TCP
                                                                            2025-01-14T21:09:30.805919+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.449731TCP
                                                                            2025-01-14T21:09:32.952199+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449750104.16.166.22880TCP
                                                                            2025-01-14T21:09:32.952199+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449750104.16.166.22880TCP
                                                                            2025-01-14T21:09:32.952199+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449750104.16.166.22880TCP
                                                                            2025-01-14T21:09:32.952199+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449750104.16.166.22880TCP
                                                                            2025-01-14T21:09:32.952199+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449750104.16.166.22880TCP
                                                                            2025-01-14T21:09:32.952786+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.449750TCP
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jan 14, 2025 21:09:29.617666960 CET4973080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:29.622591019 CET49675443192.168.2.4173.222.162.32
                                                                            Jan 14, 2025 21:09:29.622606039 CET8049730104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:29.622694969 CET4973080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:29.622847080 CET4973080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:29.627774000 CET8049730104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.112422943 CET8049730104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.112593889 CET4973080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.112694979 CET4973080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.112699986 CET8049730104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.112771034 CET4973080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.117588997 CET8049730104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.305298090 CET4973180192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.310440063 CET8049731104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.310524940 CET4973180192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.310789108 CET4973180192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.315629005 CET8049731104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.805015087 CET8049731104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.805250883 CET4973180192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.805357933 CET4973180192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.805918932 CET8049731104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.805989981 CET4973180192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:30.810220957 CET8049731104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:30.966624975 CET49732445192.168.2.4209.206.153.124
                                                                            Jan 14, 2025 21:09:30.971716881 CET44549732209.206.153.124192.168.2.4
                                                                            Jan 14, 2025 21:09:30.971813917 CET49732445192.168.2.4209.206.153.124
                                                                            Jan 14, 2025 21:09:30.972538948 CET49732445192.168.2.4209.206.153.124
                                                                            Jan 14, 2025 21:09:30.972743034 CET49733445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:30.977417946 CET44549732209.206.153.124192.168.2.4
                                                                            Jan 14, 2025 21:09:30.977483988 CET49732445192.168.2.4209.206.153.124
                                                                            Jan 14, 2025 21:09:30.977685928 CET44549733209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:30.977750063 CET49733445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:30.992872953 CET49733445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:31.000448942 CET44549733209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:31.005763054 CET44549733209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:31.005945921 CET49733445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:31.090879917 CET49734445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:31.095891953 CET44549734209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:31.095973969 CET49734445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:31.097670078 CET49734445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:31.102516890 CET44549734209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:32.448570013 CET4975080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:32.455084085 CET8049750104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:32.455228090 CET4975080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:32.455374002 CET4975080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:32.461630106 CET8049750104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:32.875300884 CET49756445192.168.2.4200.22.137.203
                                                                            Jan 14, 2025 21:09:32.880383015 CET44549756200.22.137.203192.168.2.4
                                                                            Jan 14, 2025 21:09:32.883474112 CET49756445192.168.2.4200.22.137.203
                                                                            Jan 14, 2025 21:09:32.883531094 CET49756445192.168.2.4200.22.137.203
                                                                            Jan 14, 2025 21:09:32.883810997 CET49757445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:32.888587952 CET44549756200.22.137.203192.168.2.4
                                                                            Jan 14, 2025 21:09:32.888657093 CET49756445192.168.2.4200.22.137.203
                                                                            Jan 14, 2025 21:09:32.888760090 CET44549757200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:32.888832092 CET49757445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:32.888916016 CET49757445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:32.893829107 CET44549757200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:32.895463943 CET49757445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:32.900968075 CET49759445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:32.905836105 CET44549759200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:32.905950069 CET49759445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:32.906044006 CET49759445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:32.910891056 CET44549759200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:32.952001095 CET8049750104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:32.952198982 CET4975080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:32.952198982 CET4975080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:32.952785969 CET8049750104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:32.953505039 CET4975080192.168.2.4104.16.166.228
                                                                            Jan 14, 2025 21:09:32.957073927 CET8049750104.16.166.228192.168.2.4
                                                                            Jan 14, 2025 21:09:34.890769958 CET49780445192.168.2.4169.136.170.152
                                                                            Jan 14, 2025 21:09:34.943133116 CET44549780169.136.170.152192.168.2.4
                                                                            Jan 14, 2025 21:09:34.943231106 CET49780445192.168.2.4169.136.170.152
                                                                            Jan 14, 2025 21:09:34.943296909 CET49780445192.168.2.4169.136.170.152
                                                                            Jan 14, 2025 21:09:34.943651915 CET49782445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:34.948406935 CET44549780169.136.170.152192.168.2.4
                                                                            Jan 14, 2025 21:09:34.948482037 CET49780445192.168.2.4169.136.170.152
                                                                            Jan 14, 2025 21:09:34.948493004 CET44549782169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:34.948565006 CET49782445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:34.948610067 CET49782445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:34.950115919 CET49783445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:34.953704119 CET44549782169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:34.953775883 CET49782445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:34.955327034 CET44549783169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:34.955420971 CET49783445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:34.955511093 CET49783445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:34.960325956 CET44549783169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:36.905360937 CET49801445192.168.2.4119.53.67.248
                                                                            Jan 14, 2025 21:09:36.910512924 CET44549801119.53.67.248192.168.2.4
                                                                            Jan 14, 2025 21:09:36.910610914 CET49801445192.168.2.4119.53.67.248
                                                                            Jan 14, 2025 21:09:36.910670996 CET49801445192.168.2.4119.53.67.248
                                                                            Jan 14, 2025 21:09:36.910861969 CET49802445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:36.915769100 CET44549802119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:09:36.915802956 CET44549801119.53.67.248192.168.2.4
                                                                            Jan 14, 2025 21:09:36.915848017 CET49802445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:36.915901899 CET49801445192.168.2.4119.53.67.248
                                                                            Jan 14, 2025 21:09:36.915931940 CET49802445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:36.917154074 CET49803445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:36.921127081 CET44549802119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:09:36.921192884 CET49802445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:36.922046900 CET44549803119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:09:36.922240019 CET49803445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:36.922240019 CET49803445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:36.927123070 CET44549803119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:09:38.921169996 CET49823445192.168.2.4162.197.230.156
                                                                            Jan 14, 2025 21:09:38.926320076 CET44549823162.197.230.156192.168.2.4
                                                                            Jan 14, 2025 21:09:38.926448107 CET49823445192.168.2.4162.197.230.156
                                                                            Jan 14, 2025 21:09:38.926554918 CET49823445192.168.2.4162.197.230.156
                                                                            Jan 14, 2025 21:09:38.926841974 CET49825445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:09:38.931621075 CET44549823162.197.230.156192.168.2.4
                                                                            Jan 14, 2025 21:09:38.931704044 CET44549825162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:09:38.931729078 CET49823445192.168.2.4162.197.230.156
                                                                            Jan 14, 2025 21:09:38.931796074 CET49825445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:09:38.931859970 CET49825445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:09:38.932954073 CET49826445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:09:38.937438965 CET44549825162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:09:38.937555075 CET49825445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:09:38.937845945 CET44549826162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:09:38.937938929 CET49826445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:09:38.937984943 CET49826445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:09:38.943402052 CET44549826162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:09:40.937093019 CET49848445192.168.2.493.206.31.7
                                                                            Jan 14, 2025 21:09:40.942279100 CET4454984893.206.31.7192.168.2.4
                                                                            Jan 14, 2025 21:09:40.942389011 CET49848445192.168.2.493.206.31.7
                                                                            Jan 14, 2025 21:09:40.942517042 CET49848445192.168.2.493.206.31.7
                                                                            Jan 14, 2025 21:09:40.942733049 CET49849445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:09:40.947582960 CET4454984893.206.31.7192.168.2.4
                                                                            Jan 14, 2025 21:09:40.947648048 CET4454984993.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:09:40.947657108 CET49848445192.168.2.493.206.31.7
                                                                            Jan 14, 2025 21:09:40.947721958 CET49849445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:09:40.947820902 CET49849445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:09:40.949048042 CET49850445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:09:40.952721119 CET4454984993.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:09:40.952775955 CET49849445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:09:40.953986883 CET4454985093.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:09:40.954054117 CET49850445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:09:40.954096079 CET49850445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:09:40.958893061 CET4454985093.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:09:42.951302052 CET49874445192.168.2.480.208.52.48
                                                                            Jan 14, 2025 21:09:42.956227064 CET4454987480.208.52.48192.168.2.4
                                                                            Jan 14, 2025 21:09:42.956321001 CET49874445192.168.2.480.208.52.48
                                                                            Jan 14, 2025 21:09:42.956415892 CET49874445192.168.2.480.208.52.48
                                                                            Jan 14, 2025 21:09:42.956605911 CET49875445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:09:42.961388111 CET4454987580.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:09:42.961473942 CET49875445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:09:42.961535931 CET49875445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:09:42.961822033 CET49876445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:09:42.961868048 CET4454987480.208.52.48192.168.2.4
                                                                            Jan 14, 2025 21:09:42.961951017 CET49874445192.168.2.480.208.52.48
                                                                            Jan 14, 2025 21:09:42.966571093 CET4454987580.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:09:42.966675043 CET4454987680.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:09:42.966690063 CET49875445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:09:42.966734886 CET49876445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:09:42.967377901 CET49876445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:09:42.972124100 CET4454987680.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:09:44.327843904 CET4972380192.168.2.4199.232.214.172
                                                                            Jan 14, 2025 21:09:44.332952023 CET8049723199.232.214.172192.168.2.4
                                                                            Jan 14, 2025 21:09:44.333585978 CET4972380192.168.2.4199.232.214.172
                                                                            Jan 14, 2025 21:09:44.967511892 CET49902445192.168.2.4212.144.65.85
                                                                            Jan 14, 2025 21:09:44.972490072 CET44549902212.144.65.85192.168.2.4
                                                                            Jan 14, 2025 21:09:44.972568989 CET49902445192.168.2.4212.144.65.85
                                                                            Jan 14, 2025 21:09:44.972584009 CET49902445192.168.2.4212.144.65.85
                                                                            Jan 14, 2025 21:09:44.972839117 CET49903445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:09:44.977632046 CET44549902212.144.65.85192.168.2.4
                                                                            Jan 14, 2025 21:09:44.977689981 CET49902445192.168.2.4212.144.65.85
                                                                            Jan 14, 2025 21:09:44.977698088 CET44549903212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:09:44.977900028 CET49903445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:09:44.977972984 CET49903445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:09:44.978291988 CET49904445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:09:44.982952118 CET44549903212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:09:44.983016968 CET49903445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:09:44.983067989 CET44549904212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:09:44.983129978 CET49904445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:09:44.983164072 CET49904445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:09:44.988013983 CET44549904212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:09:46.984173059 CET49928445192.168.2.4115.92.242.196
                                                                            Jan 14, 2025 21:09:46.989075899 CET44549928115.92.242.196192.168.2.4
                                                                            Jan 14, 2025 21:09:46.989156008 CET49928445192.168.2.4115.92.242.196
                                                                            Jan 14, 2025 21:09:46.989260912 CET49928445192.168.2.4115.92.242.196
                                                                            Jan 14, 2025 21:09:46.989389896 CET49929445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:09:46.994146109 CET44549929115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:09:46.994205952 CET49929445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:09:46.994252920 CET49929445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:09:46.994631052 CET49930445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:09:46.995168924 CET44549928115.92.242.196192.168.2.4
                                                                            Jan 14, 2025 21:09:46.995229006 CET49928445192.168.2.4115.92.242.196
                                                                            Jan 14, 2025 21:09:46.999202013 CET44549929115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:09:46.999262094 CET49929445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:09:46.999556065 CET44549930115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:09:47.000206947 CET49930445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:09:47.000338078 CET49930445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:09:47.005095959 CET44549930115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:09:48.998254061 CET49953445192.168.2.427.11.108.236
                                                                            Jan 14, 2025 21:09:49.003757000 CET4454995327.11.108.236192.168.2.4
                                                                            Jan 14, 2025 21:09:49.003850937 CET49953445192.168.2.427.11.108.236
                                                                            Jan 14, 2025 21:09:49.004113913 CET49953445192.168.2.427.11.108.236
                                                                            Jan 14, 2025 21:09:49.004293919 CET49954445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:09:49.009155035 CET4454995427.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:09:49.009219885 CET49954445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:09:49.009259939 CET4454995327.11.108.236192.168.2.4
                                                                            Jan 14, 2025 21:09:49.009321928 CET49953445192.168.2.427.11.108.236
                                                                            Jan 14, 2025 21:09:49.009366989 CET49954445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:09:49.009874105 CET49955445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:09:49.014466047 CET4454995427.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:09:49.014518976 CET49954445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:09:49.014755964 CET4454995527.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:09:49.014821053 CET49955445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:09:49.018217087 CET49955445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:09:49.023066998 CET4454995527.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:09:51.013762951 CET49975445192.168.2.456.74.217.226
                                                                            Jan 14, 2025 21:09:51.019056082 CET4454997556.74.217.226192.168.2.4
                                                                            Jan 14, 2025 21:09:51.019171000 CET49975445192.168.2.456.74.217.226
                                                                            Jan 14, 2025 21:09:51.019212008 CET49975445192.168.2.456.74.217.226
                                                                            Jan 14, 2025 21:09:51.019385099 CET49976445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:09:51.024358034 CET4454997656.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:09:51.024454117 CET49976445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:09:51.024501085 CET49976445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:09:51.024764061 CET49977445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:09:51.026999950 CET4454997556.74.217.226192.168.2.4
                                                                            Jan 14, 2025 21:09:51.027079105 CET49975445192.168.2.456.74.217.226
                                                                            Jan 14, 2025 21:09:51.029639006 CET4454997756.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:09:51.029714108 CET49977445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:09:51.029748917 CET49977445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:09:51.032236099 CET4454997656.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:09:51.032298088 CET49976445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:09:51.034539938 CET4454997756.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:09:52.498182058 CET44549734209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:52.498266935 CET49734445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:52.498380899 CET49734445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:52.498380899 CET49734445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:52.504779100 CET44549734209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:52.504811049 CET44549734209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:53.029308081 CET49999445192.168.2.4207.63.162.31
                                                                            Jan 14, 2025 21:09:53.034656048 CET44549999207.63.162.31192.168.2.4
                                                                            Jan 14, 2025 21:09:53.034775972 CET49999445192.168.2.4207.63.162.31
                                                                            Jan 14, 2025 21:09:53.034846067 CET49999445192.168.2.4207.63.162.31
                                                                            Jan 14, 2025 21:09:53.035000086 CET50000445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:09:53.039916039 CET44550000207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:09:53.039975882 CET44549999207.63.162.31192.168.2.4
                                                                            Jan 14, 2025 21:09:53.039979935 CET50000445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:09:53.040024042 CET50000445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:09:53.040043116 CET49999445192.168.2.4207.63.162.31
                                                                            Jan 14, 2025 21:09:53.040308952 CET50001445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:09:53.045279980 CET44550001207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:09:53.045352936 CET50001445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:09:53.045396090 CET50001445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:09:53.045850992 CET44550000207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:09:53.045919895 CET50000445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:09:53.050220013 CET44550001207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:09:54.277571917 CET44549759200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:54.277653933 CET49759445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:54.277693987 CET49759445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:54.277765036 CET49759445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:54.282490969 CET44549759200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:54.282620907 CET44549759200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:55.062649012 CET50023445192.168.2.4213.182.137.180
                                                                            Jan 14, 2025 21:09:55.067986012 CET44550023213.182.137.180192.168.2.4
                                                                            Jan 14, 2025 21:09:55.068095922 CET50023445192.168.2.4213.182.137.180
                                                                            Jan 14, 2025 21:09:55.092497110 CET50023445192.168.2.4213.182.137.180
                                                                            Jan 14, 2025 21:09:55.092706919 CET50024445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:55.097707033 CET44550024213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:55.097750902 CET44550023213.182.137.180192.168.2.4
                                                                            Jan 14, 2025 21:09:55.097785950 CET50024445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:55.097821951 CET50023445192.168.2.4213.182.137.180
                                                                            Jan 14, 2025 21:09:55.104825974 CET50024445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:55.105422020 CET50026445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:55.109683037 CET44550024213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:55.109801054 CET50024445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:55.110241890 CET44550026213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:55.110311031 CET50026445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:55.115900040 CET50026445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:55.120804071 CET44550026213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:55.513657093 CET50030445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:55.519531012 CET44550030209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:55.519988060 CET50030445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:55.519988060 CET50030445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:09:55.525039911 CET44550030209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:09:56.374800920 CET44549783169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:56.375643015 CET49783445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:56.375761986 CET49783445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:56.375832081 CET49783445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:56.380654097 CET44549783169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:56.380686045 CET44549783169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:56.804985046 CET44550026213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:56.805284023 CET50026445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:56.805284023 CET50026445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:56.805382013 CET50026445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:56.810264111 CET44550026213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:56.810297966 CET44550026213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:57.082072020 CET50037445192.168.2.4102.51.132.198
                                                                            Jan 14, 2025 21:09:57.087008953 CET44550037102.51.132.198192.168.2.4
                                                                            Jan 14, 2025 21:09:57.087089062 CET50037445192.168.2.4102.51.132.198
                                                                            Jan 14, 2025 21:09:57.087184906 CET50037445192.168.2.4102.51.132.198
                                                                            Jan 14, 2025 21:09:57.087388992 CET50038445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:09:57.092159033 CET44550037102.51.132.198192.168.2.4
                                                                            Jan 14, 2025 21:09:57.092217922 CET50037445192.168.2.4102.51.132.198
                                                                            Jan 14, 2025 21:09:57.092356920 CET44550038102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:09:57.092433929 CET50038445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:09:57.092505932 CET50038445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:09:57.097449064 CET44550038102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:09:57.097531080 CET50038445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:09:57.117022991 CET50039445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:09:57.121906042 CET44550039102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:09:57.121998072 CET50039445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:09:57.128297091 CET50039445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:09:57.133155107 CET44550039102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:09:57.279452085 CET50040445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:57.284600973 CET44550040200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:57.284713984 CET50040445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:57.284805059 CET50040445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:09:57.289625883 CET44550040200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:58.385786057 CET44549803119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:09:58.385879040 CET49803445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:58.385970116 CET49803445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:58.386032104 CET49803445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:09:58.390737057 CET44549803119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:09:58.390803099 CET44549803119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.092189074 CET50041445192.168.2.430.170.238.183
                                                                            Jan 14, 2025 21:09:59.097580910 CET4455004130.170.238.183192.168.2.4
                                                                            Jan 14, 2025 21:09:59.097923040 CET50041445192.168.2.430.170.238.183
                                                                            Jan 14, 2025 21:09:59.097982883 CET50041445192.168.2.430.170.238.183
                                                                            Jan 14, 2025 21:09:59.098190069 CET50042445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:09:59.103250027 CET4455004130.170.238.183192.168.2.4
                                                                            Jan 14, 2025 21:09:59.103285074 CET4455004230.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.103347063 CET50041445192.168.2.430.170.238.183
                                                                            Jan 14, 2025 21:09:59.103622913 CET50042445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:09:59.103713989 CET50042445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:09:59.104270935 CET50043445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:09:59.108716011 CET4455004230.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.109039068 CET50042445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:09:59.109266043 CET4455004330.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.109476089 CET50043445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:09:59.109551907 CET50043445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:09:59.114612103 CET4455004330.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.388921976 CET50044445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:59.393914938 CET44550044169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.394021988 CET50044445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:59.394169092 CET50044445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:09:59.398972034 CET44550044169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.810395002 CET50045445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:59.815488100 CET44550045213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:09:59.815608025 CET50045445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:59.815628052 CET50045445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:09:59.820606947 CET44550045213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:10:00.307858944 CET44549826162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:00.307985067 CET49826445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:00.308141947 CET49826445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:00.308228016 CET49826445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:00.312952042 CET44549826162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:00.313041925 CET44549826162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.107733965 CET50046445192.168.2.4184.137.238.58
                                                                            Jan 14, 2025 21:10:01.112850904 CET44550046184.137.238.58192.168.2.4
                                                                            Jan 14, 2025 21:10:01.112974882 CET50046445192.168.2.4184.137.238.58
                                                                            Jan 14, 2025 21:10:01.113070011 CET50046445192.168.2.4184.137.238.58
                                                                            Jan 14, 2025 21:10:01.113425970 CET50047445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:01.118155956 CET44550046184.137.238.58192.168.2.4
                                                                            Jan 14, 2025 21:10:01.118228912 CET50046445192.168.2.4184.137.238.58
                                                                            Jan 14, 2025 21:10:01.118386984 CET44550047184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.118639946 CET50047445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:01.118640900 CET50047445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:01.118928909 CET50048445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:01.123874903 CET44550048184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.123930931 CET44550047184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.123958111 CET50048445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:01.124032021 CET50048445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:01.124064922 CET50047445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:01.128864050 CET44550048184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.388571978 CET50049445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:10:01.393603086 CET44550049119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.393704891 CET50049445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:10:01.393779039 CET50049445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:10:01.398622036 CET44550049119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.509910107 CET44550045213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.510066032 CET50045445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:10:01.510143042 CET50045445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:10:01.510143042 CET50045445192.168.2.4213.182.137.1
                                                                            Jan 14, 2025 21:10:01.515008926 CET44550045213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.515039921 CET44550045213.182.137.1192.168.2.4
                                                                            Jan 14, 2025 21:10:01.576083899 CET50050445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:01.580974102 CET44550050213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:01.581069946 CET50050445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:01.581140995 CET50050445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:01.581511021 CET50051445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:01.586484909 CET44550051213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:01.586546898 CET44550050213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:01.586570024 CET50051445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:01.586617947 CET50051445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:01.586750984 CET50050445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:01.591464043 CET44550051213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:02.340352058 CET4454985093.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:02.340558052 CET49850445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:02.340647936 CET49850445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:02.340715885 CET49850445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:02.345561981 CET4454985093.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:02.345578909 CET4454985093.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:03.149003029 CET50052445192.168.2.4120.231.161.246
                                                                            Jan 14, 2025 21:10:03.154253006 CET44550052120.231.161.246192.168.2.4
                                                                            Jan 14, 2025 21:10:03.154375076 CET50052445192.168.2.4120.231.161.246
                                                                            Jan 14, 2025 21:10:03.167535067 CET50052445192.168.2.4120.231.161.246
                                                                            Jan 14, 2025 21:10:03.167644978 CET50053445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:03.172466993 CET44550053120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:03.172561884 CET50053445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:03.174356937 CET44550052120.231.161.246192.168.2.4
                                                                            Jan 14, 2025 21:10:03.174447060 CET50052445192.168.2.4120.231.161.246
                                                                            Jan 14, 2025 21:10:03.194448948 CET50053445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:03.199493885 CET44550053120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:03.199588060 CET50053445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:03.233068943 CET50054445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:03.238188982 CET44550054120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:03.238281012 CET50054445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:03.238332033 CET50054445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:03.243166924 CET44550054120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:03.312417984 CET50055445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:03.317615986 CET44550055162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:03.317693949 CET50055445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:03.317997932 CET50055445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:03.322902918 CET44550055162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:04.354207993 CET4454987680.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:04.354386091 CET49876445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:04.354386091 CET49876445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:04.354496002 CET49876445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:04.359536886 CET4454987680.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:04.359569073 CET4454987680.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:05.139173985 CET50056445192.168.2.438.75.111.140
                                                                            Jan 14, 2025 21:10:05.144496918 CET4455005638.75.111.140192.168.2.4
                                                                            Jan 14, 2025 21:10:05.144669056 CET50056445192.168.2.438.75.111.140
                                                                            Jan 14, 2025 21:10:05.144670010 CET50056445192.168.2.438.75.111.140
                                                                            Jan 14, 2025 21:10:05.144843102 CET50057445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:05.149868965 CET4455005738.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:05.149899960 CET4455005638.75.111.140192.168.2.4
                                                                            Jan 14, 2025 21:10:05.149970055 CET50057445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:05.150043011 CET50056445192.168.2.438.75.111.140
                                                                            Jan 14, 2025 21:10:05.150154114 CET50057445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:05.150623083 CET50058445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:05.155098915 CET4455005738.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:05.155169010 CET50057445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:05.155618906 CET4455005838.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:05.155704975 CET50058445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:05.155761957 CET50058445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:05.160785913 CET4455005838.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:05.341959000 CET50059445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:05.347273111 CET4455005993.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:05.347395897 CET50059445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:05.347443104 CET50059445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:05.352340937 CET4455005993.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:06.358155966 CET44549904212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:06.358412981 CET49904445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:06.358412981 CET49904445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:06.358412981 CET49904445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:06.363400936 CET44549904212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:06.363434076 CET44549904212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:07.014138937 CET50060445192.168.2.446.252.216.196
                                                                            Jan 14, 2025 21:10:07.019253969 CET4455006046.252.216.196192.168.2.4
                                                                            Jan 14, 2025 21:10:07.019372940 CET50060445192.168.2.446.252.216.196
                                                                            Jan 14, 2025 21:10:07.019421101 CET50060445192.168.2.446.252.216.196
                                                                            Jan 14, 2025 21:10:07.019499063 CET50061445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:07.024434090 CET4455006146.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:07.024561882 CET50061445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:07.024561882 CET50061445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:07.025032997 CET50062445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:07.025974035 CET4455006046.252.216.196192.168.2.4
                                                                            Jan 14, 2025 21:10:07.026048899 CET50060445192.168.2.446.252.216.196
                                                                            Jan 14, 2025 21:10:07.029565096 CET4455006146.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:07.029664993 CET50061445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:07.029943943 CET4455006246.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:07.030030966 CET50062445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:07.030096054 CET50062445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:07.034914970 CET4455006246.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:07.357475042 CET50063445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:07.362649918 CET4455006380.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:07.362750053 CET50063445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:07.362793922 CET50063445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:07.367680073 CET4455006380.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.370244980 CET44549930115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.370361090 CET49930445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:08.370424032 CET49930445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:08.370424032 CET49930445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:08.375356913 CET44549930115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.375390053 CET44549930115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.732095003 CET4455006246.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.732203007 CET50062445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:08.732316971 CET50062445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:08.732426882 CET50062445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:08.737185955 CET4455006246.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.737214088 CET4455006246.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.765594006 CET50064445192.168.2.4116.151.79.149
                                                                            Jan 14, 2025 21:10:08.770925999 CET44550064116.151.79.149192.168.2.4
                                                                            Jan 14, 2025 21:10:08.771162033 CET50064445192.168.2.4116.151.79.149
                                                                            Jan 14, 2025 21:10:08.771162033 CET50064445192.168.2.4116.151.79.149
                                                                            Jan 14, 2025 21:10:08.771370888 CET50065445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:08.776344061 CET44550065116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.776376009 CET44550064116.151.79.149192.168.2.4
                                                                            Jan 14, 2025 21:10:08.776436090 CET50065445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:08.776478052 CET50065445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:08.776503086 CET44550064116.151.79.149192.168.2.4
                                                                            Jan 14, 2025 21:10:08.776560068 CET50064445192.168.2.4116.151.79.149
                                                                            Jan 14, 2025 21:10:08.776850939 CET50066445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:08.781523943 CET44550065116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.781599045 CET50065445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:08.781686068 CET44550066116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:08.781759977 CET50066445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:08.781855106 CET50066445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:08.786642075 CET44550066116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:09.374162912 CET50067445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:09.379405975 CET44550067212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:09.379488945 CET50067445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:09.379523039 CET50067445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:09.384397984 CET44550067212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.388006926 CET4454995527.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.388111115 CET49955445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:10.388170958 CET49955445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:10.388220072 CET49955445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:10.392988920 CET4454995527.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.393002987 CET4454995527.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.404769897 CET50068445192.168.2.459.249.2.141
                                                                            Jan 14, 2025 21:10:10.409656048 CET4455006859.249.2.141192.168.2.4
                                                                            Jan 14, 2025 21:10:10.409748077 CET50068445192.168.2.459.249.2.141
                                                                            Jan 14, 2025 21:10:10.409769058 CET50068445192.168.2.459.249.2.141
                                                                            Jan 14, 2025 21:10:10.409873962 CET50069445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:10.414800882 CET4455006959.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.414825916 CET4455006859.249.2.141192.168.2.4
                                                                            Jan 14, 2025 21:10:10.414885044 CET50069445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:10.414901972 CET50068445192.168.2.459.249.2.141
                                                                            Jan 14, 2025 21:10:10.415018082 CET50069445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:10.415381908 CET50070445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:10.420296907 CET4455007059.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.420310974 CET4455006959.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.420352936 CET4455006959.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:10.420401096 CET50069445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:10.420486927 CET50070445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:10.420486927 CET50070445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:10.425550938 CET4455007059.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.373083115 CET50071445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:11.378263950 CET44550071115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.378350973 CET50071445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:11.378385067 CET50071445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:11.383284092 CET44550071115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.427532911 CET6376753192.168.2.4162.159.36.2
                                                                            Jan 14, 2025 21:10:11.432369947 CET5363767162.159.36.2192.168.2.4
                                                                            Jan 14, 2025 21:10:11.432451963 CET6376753192.168.2.4162.159.36.2
                                                                            Jan 14, 2025 21:10:11.437347889 CET5363767162.159.36.2192.168.2.4
                                                                            Jan 14, 2025 21:10:11.748122931 CET63768445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:11.753071070 CET4456376846.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.753160000 CET63768445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:11.753237963 CET63768445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:11.757996082 CET4456376846.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.898705959 CET6376753192.168.2.4162.159.36.2
                                                                            Jan 14, 2025 21:10:11.903918028 CET5363767162.159.36.2192.168.2.4
                                                                            Jan 14, 2025 21:10:11.903985977 CET6376753192.168.2.4162.159.36.2
                                                                            Jan 14, 2025 21:10:11.936759949 CET63770445192.168.2.4164.101.196.12
                                                                            Jan 14, 2025 21:10:11.941616058 CET44563770164.101.196.12192.168.2.4
                                                                            Jan 14, 2025 21:10:11.941696882 CET63770445192.168.2.4164.101.196.12
                                                                            Jan 14, 2025 21:10:11.941739082 CET63770445192.168.2.4164.101.196.12
                                                                            Jan 14, 2025 21:10:11.941860914 CET63771445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:11.946733952 CET44563771164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.946816921 CET63771445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:11.946870089 CET63771445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:11.947699070 CET63772445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:11.948288918 CET44563770164.101.196.12192.168.2.4
                                                                            Jan 14, 2025 21:10:11.952694893 CET44563772164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.952780008 CET63772445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:11.952826023 CET63772445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:11.956388950 CET44563771164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.957150936 CET44563770164.101.196.12192.168.2.4
                                                                            Jan 14, 2025 21:10:11.957215071 CET63770445192.168.2.4164.101.196.12
                                                                            Jan 14, 2025 21:10:11.957631111 CET44563772164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.958668947 CET44563771164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:11.958719969 CET63771445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:12.389231920 CET4454997756.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:10:12.389322042 CET49977445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:10:12.389364004 CET49977445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:10:12.389446020 CET49977445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:10:12.394354105 CET4454997756.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:10:12.394371986 CET4454997756.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.357888937 CET63774445192.168.2.4161.211.120.117
                                                                            Jan 14, 2025 21:10:13.363166094 CET44563774161.211.120.117192.168.2.4
                                                                            Jan 14, 2025 21:10:13.363260031 CET63774445192.168.2.4161.211.120.117
                                                                            Jan 14, 2025 21:10:13.363348961 CET63774445192.168.2.4161.211.120.117
                                                                            Jan 14, 2025 21:10:13.363650084 CET63775445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:13.368320942 CET44563774161.211.120.117192.168.2.4
                                                                            Jan 14, 2025 21:10:13.368664026 CET44563775161.211.120.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.368753910 CET63775445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:13.368796110 CET63775445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:13.369338036 CET63776445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:13.372410059 CET44563774161.211.120.117192.168.2.4
                                                                            Jan 14, 2025 21:10:13.372541904 CET63774445192.168.2.4161.211.120.117
                                                                            Jan 14, 2025 21:10:13.373806953 CET44563775161.211.120.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.373904943 CET63775445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:13.374139071 CET44563776161.211.120.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.374216080 CET63776445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:13.374291897 CET63776445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:13.379230976 CET44563776161.211.120.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.388590097 CET63777445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:13.393448114 CET4456377727.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.393528938 CET63777445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:13.393573999 CET63777445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:13.399703026 CET4456377727.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.448518038 CET4456376846.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.448638916 CET63768445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:13.448638916 CET63768445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:13.448704004 CET63768445192.168.2.446.252.216.1
                                                                            Jan 14, 2025 21:10:13.453736067 CET4456376846.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.453767061 CET4456376846.252.216.1192.168.2.4
                                                                            Jan 14, 2025 21:10:13.515206099 CET63778445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:13.520278931 CET4456377846.252.216.2192.168.2.4
                                                                            Jan 14, 2025 21:10:13.520368099 CET63778445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:13.520505905 CET63778445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:13.520911932 CET63779445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:13.525444984 CET4456377846.252.216.2192.168.2.4
                                                                            Jan 14, 2025 21:10:13.525509119 CET63778445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:13.525815010 CET4456377946.252.216.2192.168.2.4
                                                                            Jan 14, 2025 21:10:13.525896072 CET63779445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:13.525959969 CET63779445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:13.530836105 CET4456377946.252.216.2192.168.2.4
                                                                            Jan 14, 2025 21:10:14.434362888 CET44550001207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:10:14.434688091 CET50001445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:10:14.434688091 CET50001445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:10:14.434688091 CET50001445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:10:14.439620018 CET44550001207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:10:14.439629078 CET44550001207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:10:14.685993910 CET63780445192.168.2.448.251.159.176
                                                                            Jan 14, 2025 21:10:14.691097975 CET4456378048.251.159.176192.168.2.4
                                                                            Jan 14, 2025 21:10:14.691200972 CET63780445192.168.2.448.251.159.176
                                                                            Jan 14, 2025 21:10:14.691304922 CET63780445192.168.2.448.251.159.176
                                                                            Jan 14, 2025 21:10:14.691530943 CET63781445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:14.696295023 CET4456378048.251.159.176192.168.2.4
                                                                            Jan 14, 2025 21:10:14.696327925 CET4456378048.251.159.176192.168.2.4
                                                                            Jan 14, 2025 21:10:14.696388006 CET63780445192.168.2.448.251.159.176
                                                                            Jan 14, 2025 21:10:14.696425915 CET4456378148.251.159.1192.168.2.4
                                                                            Jan 14, 2025 21:10:14.696500063 CET63781445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:14.696558952 CET63781445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:14.696918011 CET63782445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:14.701752901 CET4456378248.251.159.1192.168.2.4
                                                                            Jan 14, 2025 21:10:14.702567101 CET63782445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:14.702567101 CET63782445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:14.704336882 CET4456378148.251.159.1192.168.2.4
                                                                            Jan 14, 2025 21:10:14.704699993 CET4456378148.251.159.1192.168.2.4
                                                                            Jan 14, 2025 21:10:14.704770088 CET63781445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:14.707437038 CET4456378248.251.159.1192.168.2.4
                                                                            Jan 14, 2025 21:10:15.404371977 CET63783445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:10:15.409451008 CET4456378356.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:10:15.409555912 CET63783445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:10:15.409605980 CET63783445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:10:15.414397001 CET4456378356.74.217.1192.168.2.4
                                                                            Jan 14, 2025 21:10:15.920181036 CET63784445192.168.2.473.80.3.78
                                                                            Jan 14, 2025 21:10:15.925060034 CET4456378473.80.3.78192.168.2.4
                                                                            Jan 14, 2025 21:10:15.925175905 CET63784445192.168.2.473.80.3.78
                                                                            Jan 14, 2025 21:10:15.925273895 CET63784445192.168.2.473.80.3.78
                                                                            Jan 14, 2025 21:10:15.925275087 CET63785445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:15.930080891 CET4456378573.80.3.1192.168.2.4
                                                                            Jan 14, 2025 21:10:15.930154085 CET63785445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:15.930181980 CET63785445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:15.930202007 CET4456378473.80.3.78192.168.2.4
                                                                            Jan 14, 2025 21:10:15.930257082 CET63784445192.168.2.473.80.3.78
                                                                            Jan 14, 2025 21:10:15.930452108 CET63786445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:15.935092926 CET4456378573.80.3.1192.168.2.4
                                                                            Jan 14, 2025 21:10:15.935337067 CET4456378673.80.3.1192.168.2.4
                                                                            Jan 14, 2025 21:10:15.935343981 CET63785445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:15.935411930 CET63786445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:15.935467958 CET63786445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:15.940270901 CET4456378673.80.3.1192.168.2.4
                                                                            Jan 14, 2025 21:10:16.869951963 CET44550030209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:10:16.870218039 CET50030445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:10:16.870218039 CET50030445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:10:16.870218992 CET50030445192.168.2.4209.206.153.1
                                                                            Jan 14, 2025 21:10:16.875144958 CET44550030209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:10:16.875200033 CET44550030209.206.153.1192.168.2.4
                                                                            Jan 14, 2025 21:10:16.938855886 CET63787445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:16.944895983 CET44563787209.206.153.2192.168.2.4
                                                                            Jan 14, 2025 21:10:16.944996119 CET63787445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:16.945070982 CET63787445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:16.945487022 CET63788445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:16.950233936 CET44563787209.206.153.2192.168.2.4
                                                                            Jan 14, 2025 21:10:16.950313091 CET63787445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:16.950365067 CET44563788209.206.153.2192.168.2.4
                                                                            Jan 14, 2025 21:10:16.950439930 CET63788445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:16.950478077 CET63788445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:16.955370903 CET44563788209.206.153.2192.168.2.4
                                                                            Jan 14, 2025 21:10:17.077105999 CET63789445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.082598925 CET44563789111.9.60.1192.168.2.4
                                                                            Jan 14, 2025 21:10:17.082751036 CET63789445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.082833052 CET63789445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.084114075 CET63790445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.088304043 CET44563789111.9.60.1192.168.2.4
                                                                            Jan 14, 2025 21:10:17.091336012 CET63789445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.091407061 CET44563790111.9.60.1192.168.2.4
                                                                            Jan 14, 2025 21:10:17.091495037 CET63790445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.091557980 CET63790445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.092271090 CET63791445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.097160101 CET44563790111.9.60.1192.168.2.4
                                                                            Jan 14, 2025 21:10:17.097193956 CET44563791111.9.60.1192.168.2.4
                                                                            Jan 14, 2025 21:10:17.097385883 CET63790445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.097456932 CET63791445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.097456932 CET63791445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:17.102366924 CET44563791111.9.60.1192.168.2.4
                                                                            Jan 14, 2025 21:10:17.435872078 CET63792445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:10:17.441004992 CET44563792207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:10:17.441247940 CET63792445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:10:17.441287041 CET63792445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:10:17.446389914 CET44563792207.63.162.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.157136917 CET63793445192.168.2.4160.200.14.53
                                                                            Jan 14, 2025 21:10:18.161973953 CET44563793160.200.14.53192.168.2.4
                                                                            Jan 14, 2025 21:10:18.162097931 CET63793445192.168.2.4160.200.14.53
                                                                            Jan 14, 2025 21:10:18.164099932 CET63793445192.168.2.4160.200.14.53
                                                                            Jan 14, 2025 21:10:18.164334059 CET63794445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:18.168926001 CET44563793160.200.14.53192.168.2.4
                                                                            Jan 14, 2025 21:10:18.169013977 CET63793445192.168.2.4160.200.14.53
                                                                            Jan 14, 2025 21:10:18.169200897 CET44563794160.200.14.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.169281960 CET63794445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:18.255343914 CET63794445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:18.255872965 CET63795445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:18.260279894 CET44563794160.200.14.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.260693073 CET44563795160.200.14.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.260798931 CET63795445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:18.260824919 CET63795445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:18.265741110 CET44563795160.200.14.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.270607948 CET44563794160.200.14.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.270787001 CET63794445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:18.512356997 CET44550039102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.512424946 CET50039445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:10:18.513001919 CET50039445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:10:18.513001919 CET50039445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:10:18.517847061 CET44550039102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.517858028 CET44550039102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.686578989 CET44550040200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.686697960 CET50040445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:10:18.687323093 CET50040445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:10:18.687398911 CET50040445192.168.2.4200.22.137.1
                                                                            Jan 14, 2025 21:10:18.692210913 CET44550040200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.692223072 CET44550040200.22.137.1192.168.2.4
                                                                            Jan 14, 2025 21:10:18.749933958 CET63796445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:18.754843950 CET44563796200.22.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:18.754916906 CET63796445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:18.754997015 CET63796445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:18.760284901 CET44563796200.22.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:18.762438059 CET63797445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:18.767350912 CET44563797200.22.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:18.767462969 CET63797445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:18.767612934 CET63797445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:18.771205902 CET44563796200.22.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:18.771267891 CET63796445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:18.772413015 CET44563797200.22.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:19.170295954 CET63798445192.168.2.441.59.15.223
                                                                            Jan 14, 2025 21:10:19.175242901 CET4456379841.59.15.223192.168.2.4
                                                                            Jan 14, 2025 21:10:19.175353050 CET63798445192.168.2.441.59.15.223
                                                                            Jan 14, 2025 21:10:19.175393105 CET63798445192.168.2.441.59.15.223
                                                                            Jan 14, 2025 21:10:19.175790071 CET63799445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:19.180555105 CET4456379841.59.15.223192.168.2.4
                                                                            Jan 14, 2025 21:10:19.180632114 CET63798445192.168.2.441.59.15.223
                                                                            Jan 14, 2025 21:10:19.180665016 CET4456379941.59.15.1192.168.2.4
                                                                            Jan 14, 2025 21:10:19.180736065 CET63799445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:19.180810928 CET63799445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:19.181250095 CET63800445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:19.185810089 CET4456379941.59.15.1192.168.2.4
                                                                            Jan 14, 2025 21:10:19.185885906 CET63799445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:19.186104059 CET4456380041.59.15.1192.168.2.4
                                                                            Jan 14, 2025 21:10:19.186223030 CET63800445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:19.186223030 CET63800445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:19.191010952 CET4456380041.59.15.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.107734919 CET63802445192.168.2.4128.149.196.41
                                                                            Jan 14, 2025 21:10:20.112909079 CET44563802128.149.196.41192.168.2.4
                                                                            Jan 14, 2025 21:10:20.113641024 CET63802445192.168.2.4128.149.196.41
                                                                            Jan 14, 2025 21:10:20.113837004 CET63802445192.168.2.4128.149.196.41
                                                                            Jan 14, 2025 21:10:20.114139080 CET63803445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:20.119158983 CET44563803128.149.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.120311022 CET44563802128.149.196.41192.168.2.4
                                                                            Jan 14, 2025 21:10:20.120399952 CET63803445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:20.120476961 CET63803445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:20.120843887 CET63804445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:20.121709108 CET44563802128.149.196.41192.168.2.4
                                                                            Jan 14, 2025 21:10:20.125430107 CET44563803128.149.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.125503063 CET63802445192.168.2.4128.149.196.41
                                                                            Jan 14, 2025 21:10:20.125554085 CET63803445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:20.125694036 CET44563804128.149.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.129517078 CET63804445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:20.129581928 CET63804445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:20.134407997 CET44563804128.149.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.479408026 CET4455004330.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.479677916 CET50043445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:10:20.479679108 CET50043445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:10:20.479679108 CET50043445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:10:20.484688997 CET4455004330.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.484698057 CET4455004330.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.760400057 CET44550044169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.760469913 CET50044445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:10:20.760586977 CET50044445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:10:20.760662079 CET50044445192.168.2.4169.136.170.1
                                                                            Jan 14, 2025 21:10:20.765362978 CET44550044169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.765427113 CET44550044169.136.170.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.826253891 CET63805445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:20.831212044 CET44563805169.136.170.2192.168.2.4
                                                                            Jan 14, 2025 21:10:20.831326008 CET63805445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:20.831326008 CET63805445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:20.831615925 CET63806445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:20.836294889 CET44563805169.136.170.2192.168.2.4
                                                                            Jan 14, 2025 21:10:20.836546898 CET44563806169.136.170.2192.168.2.4
                                                                            Jan 14, 2025 21:10:20.836618900 CET63806445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:20.836667061 CET63806445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:20.841444969 CET44563806169.136.170.2192.168.2.4
                                                                            Jan 14, 2025 21:10:20.843328953 CET44563805169.136.170.2192.168.2.4
                                                                            Jan 14, 2025 21:10:20.843416929 CET63805445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:20.988928080 CET63807445192.168.2.4164.242.37.25
                                                                            Jan 14, 2025 21:10:20.993844986 CET44563807164.242.37.25192.168.2.4
                                                                            Jan 14, 2025 21:10:20.993974924 CET63807445192.168.2.4164.242.37.25
                                                                            Jan 14, 2025 21:10:20.994044065 CET63807445192.168.2.4164.242.37.25
                                                                            Jan 14, 2025 21:10:20.994158030 CET63808445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:20.999058962 CET44563808164.242.37.1192.168.2.4
                                                                            Jan 14, 2025 21:10:20.999350071 CET63808445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:20.999351025 CET63808445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:20.999465942 CET63809445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:21.004432917 CET44563809164.242.37.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.004443884 CET44563807164.242.37.25192.168.2.4
                                                                            Jan 14, 2025 21:10:21.004451990 CET44563808164.242.37.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.004559040 CET63809445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:21.004559040 CET63809445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:21.009427071 CET44563809164.242.37.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.012301922 CET44563807164.242.37.25192.168.2.4
                                                                            Jan 14, 2025 21:10:21.012356043 CET63807445192.168.2.4164.242.37.25
                                                                            Jan 14, 2025 21:10:21.013673067 CET44563808164.242.37.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.013736963 CET63808445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:21.513711929 CET63815445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:10:21.518646002 CET44563815102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.518721104 CET63815445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:10:21.521394014 CET63815445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:10:21.526170969 CET44563815102.51.132.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.810884953 CET63816445192.168.2.419.230.79.176
                                                                            Jan 14, 2025 21:10:21.817387104 CET4456381619.230.79.176192.168.2.4
                                                                            Jan 14, 2025 21:10:21.817471027 CET63816445192.168.2.419.230.79.176
                                                                            Jan 14, 2025 21:10:21.817548990 CET63816445192.168.2.419.230.79.176
                                                                            Jan 14, 2025 21:10:21.817728043 CET63817445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:21.824076891 CET4456381619.230.79.176192.168.2.4
                                                                            Jan 14, 2025 21:10:21.824093103 CET4456381719.230.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.824165106 CET63816445192.168.2.419.230.79.176
                                                                            Jan 14, 2025 21:10:21.824220896 CET63817445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:21.824317932 CET63817445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:21.824676991 CET63818445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:21.830607891 CET4456381719.230.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.830688953 CET63817445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:21.831094980 CET4456381819.230.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:21.831170082 CET63818445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:21.831192970 CET63818445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:21.837532997 CET4456381819.230.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.495821953 CET44550048184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.496035099 CET50048445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:22.496035099 CET50048445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:22.496035099 CET50048445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:22.501008034 CET44550048184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.501020908 CET44550048184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.576550961 CET63824445192.168.2.410.31.243.204
                                                                            Jan 14, 2025 21:10:22.581434965 CET4456382410.31.243.204192.168.2.4
                                                                            Jan 14, 2025 21:10:22.581552982 CET63824445192.168.2.410.31.243.204
                                                                            Jan 14, 2025 21:10:22.581552982 CET63824445192.168.2.410.31.243.204
                                                                            Jan 14, 2025 21:10:22.581703901 CET63825445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:22.586494923 CET4456382510.31.243.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.586580992 CET63825445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:22.586580992 CET63825445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:22.586837053 CET4456382410.31.243.204192.168.2.4
                                                                            Jan 14, 2025 21:10:22.587047100 CET63826445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:22.587147951 CET63824445192.168.2.410.31.243.204
                                                                            Jan 14, 2025 21:10:22.591523886 CET4456382510.31.243.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.591605902 CET63825445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:22.591845036 CET4456382610.31.243.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.591919899 CET63826445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:22.591944933 CET63826445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:22.596755981 CET4456382610.31.243.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.764760017 CET44550049119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.764986992 CET50049445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:10:22.765086889 CET50049445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:10:22.765242100 CET50049445192.168.2.4119.53.67.1
                                                                            Jan 14, 2025 21:10:22.769812107 CET44550049119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.769970894 CET44550049119.53.67.1192.168.2.4
                                                                            Jan 14, 2025 21:10:22.832988024 CET63827445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:22.837804079 CET44563827119.53.67.2192.168.2.4
                                                                            Jan 14, 2025 21:10:22.837888002 CET63827445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:22.837935925 CET63827445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:22.840133905 CET63830445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:22.843120098 CET44563827119.53.67.2192.168.2.4
                                                                            Jan 14, 2025 21:10:22.843178034 CET63827445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:22.844985008 CET44563830119.53.67.2192.168.2.4
                                                                            Jan 14, 2025 21:10:22.845061064 CET63830445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:22.845097065 CET63830445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:22.849917889 CET44563830119.53.67.2192.168.2.4
                                                                            Jan 14, 2025 21:10:22.949199915 CET44550051213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:22.949321985 CET50051445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:22.949322939 CET50051445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:22.949485064 CET50051445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:22.954293966 CET44550051213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:22.954338074 CET44550051213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:23.485495090 CET63835445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:10:23.490324020 CET4456383530.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:23.490443945 CET63835445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:10:23.490490913 CET63835445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:10:23.495332956 CET4456383530.170.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:24.604377031 CET44550054120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:24.604549885 CET50054445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:24.604640007 CET50054445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:24.604640007 CET50054445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:24.609806061 CET44550054120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:24.610934019 CET44550054120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:24.685190916 CET44550055162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:24.685298920 CET50055445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:24.685527086 CET50055445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:24.685591936 CET50055445192.168.2.4162.197.230.1
                                                                            Jan 14, 2025 21:10:24.690324068 CET44550055162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:24.690376043 CET44550055162.197.230.1192.168.2.4
                                                                            Jan 14, 2025 21:10:24.748040915 CET63848445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:24.754476070 CET44563848162.197.230.2192.168.2.4
                                                                            Jan 14, 2025 21:10:24.754686117 CET63848445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:24.754686117 CET63848445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:24.754997015 CET63849445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:24.761687040 CET44563849162.197.230.2192.168.2.4
                                                                            Jan 14, 2025 21:10:24.761787891 CET63849445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:24.761787891 CET63849445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:24.761864901 CET44563848162.197.230.2192.168.2.4
                                                                            Jan 14, 2025 21:10:24.761938095 CET63848445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:24.767379045 CET44563849162.197.230.2192.168.2.4
                                                                            Jan 14, 2025 21:10:25.497977972 CET63858445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:25.503062010 CET44563858184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:25.503165960 CET63858445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:25.503205061 CET63858445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:25.508064032 CET44563858184.137.238.1192.168.2.4
                                                                            Jan 14, 2025 21:10:25.951610088 CET63860445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:25.956433058 CET44563860213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:25.956552982 CET63860445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:25.956640005 CET63860445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:25.961416960 CET44563860213.182.137.2192.168.2.4
                                                                            Jan 14, 2025 21:10:26.528143883 CET4455005838.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:26.528263092 CET50058445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:26.528322935 CET50058445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:26.528322935 CET50058445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:26.533189058 CET4455005838.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:26.533205032 CET4455005838.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:26.729227066 CET4455005993.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:26.729461908 CET50059445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:26.729624033 CET50059445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:26.729685068 CET50059445192.168.2.493.206.31.1
                                                                            Jan 14, 2025 21:10:26.734540939 CET4455005993.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:26.734631062 CET4455005993.206.31.1192.168.2.4
                                                                            Jan 14, 2025 21:10:26.795670986 CET63877445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:26.800673962 CET4456387793.206.31.2192.168.2.4
                                                                            Jan 14, 2025 21:10:26.800765038 CET63877445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:26.804193974 CET63877445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:26.804582119 CET63878445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:26.809231043 CET4456387793.206.31.2192.168.2.4
                                                                            Jan 14, 2025 21:10:26.809340000 CET63877445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:26.809518099 CET4456387893.206.31.2192.168.2.4
                                                                            Jan 14, 2025 21:10:26.809631109 CET63878445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:26.836083889 CET63878445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:26.840926886 CET4456387893.206.31.2192.168.2.4
                                                                            Jan 14, 2025 21:10:27.607295990 CET63883445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:28.285317898 CET44563883120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:28.285576105 CET63883445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:28.285576105 CET63883445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:28.290391922 CET44563883120.231.161.1192.168.2.4
                                                                            Jan 14, 2025 21:10:28.733175039 CET4455006380.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:28.733273983 CET50063445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:28.733273983 CET50063445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:28.733298063 CET50063445192.168.2.480.208.52.1
                                                                            Jan 14, 2025 21:10:28.738065004 CET4455006380.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:28.738099098 CET4455006380.208.52.1192.168.2.4
                                                                            Jan 14, 2025 21:10:28.795305014 CET63902445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:28.800322056 CET4456390280.208.52.2192.168.2.4
                                                                            Jan 14, 2025 21:10:28.800458908 CET63902445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:28.800559998 CET63902445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:28.800892115 CET63903445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:28.805560112 CET4456390280.208.52.2192.168.2.4
                                                                            Jan 14, 2025 21:10:28.805656910 CET63902445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:28.805811882 CET4456390380.208.52.2192.168.2.4
                                                                            Jan 14, 2025 21:10:28.805876970 CET63903445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:28.805900097 CET63903445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:28.810673952 CET4456390380.208.52.2192.168.2.4
                                                                            Jan 14, 2025 21:10:29.529464006 CET63918445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:29.534322977 CET4456391838.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:29.536590099 CET63918445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:29.537559986 CET63918445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:29.542382956 CET4456391838.75.111.1192.168.2.4
                                                                            Jan 14, 2025 21:10:30.136415005 CET44550066116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:30.136518002 CET50066445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:30.136568069 CET50066445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:30.136646986 CET50066445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:30.141371012 CET44550066116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:30.141457081 CET44550066116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:30.748826027 CET44550067212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:30.748929977 CET50067445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:30.749032021 CET50067445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:30.749087095 CET50067445192.168.2.4212.144.65.1
                                                                            Jan 14, 2025 21:10:30.753999949 CET44550067212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:30.754029036 CET44550067212.144.65.1192.168.2.4
                                                                            Jan 14, 2025 21:10:30.810663939 CET63944445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:30.815639019 CET44563944212.144.65.2192.168.2.4
                                                                            Jan 14, 2025 21:10:30.815722942 CET63944445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:30.815795898 CET63944445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:30.816236973 CET63945445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:30.820725918 CET44563944212.144.65.2192.168.2.4
                                                                            Jan 14, 2025 21:10:30.820786953 CET63944445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:30.821037054 CET44563945212.144.65.2192.168.2.4
                                                                            Jan 14, 2025 21:10:30.821110010 CET63945445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:30.821144104 CET63945445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:30.825917006 CET44563945212.144.65.2192.168.2.4
                                                                            Jan 14, 2025 21:10:31.813198090 CET4455007059.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:31.815608978 CET50070445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:31.815814018 CET50070445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:31.815814018 CET50070445192.168.2.459.249.2.1
                                                                            Jan 14, 2025 21:10:31.820698977 CET4455007059.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:31.820730925 CET4455007059.249.2.1192.168.2.4
                                                                            Jan 14, 2025 21:10:32.419761896 CET4972480192.168.2.4199.232.214.172
                                                                            Jan 14, 2025 21:10:32.425131083 CET8049724199.232.214.172192.168.2.4
                                                                            Jan 14, 2025 21:10:32.425276041 CET4972480192.168.2.4199.232.214.172
                                                                            Jan 14, 2025 21:10:32.746853113 CET44550071115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:32.746928930 CET50071445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:32.746970892 CET50071445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:32.746992111 CET50071445192.168.2.4115.92.242.1
                                                                            Jan 14, 2025 21:10:32.751827955 CET44550071115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:32.751857042 CET44550071115.92.242.1192.168.2.4
                                                                            Jan 14, 2025 21:10:32.810467958 CET64014445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:32.815470934 CET44564014115.92.242.2192.168.2.4
                                                                            Jan 14, 2025 21:10:32.815666914 CET64014445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:32.815689087 CET64014445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:32.816108942 CET64015445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:32.820722103 CET44564014115.92.242.2192.168.2.4
                                                                            Jan 14, 2025 21:10:32.820863008 CET64014445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:32.820990086 CET44564015115.92.242.2192.168.2.4
                                                                            Jan 14, 2025 21:10:32.821057081 CET64015445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:32.821088076 CET64015445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:32.825861931 CET44564015115.92.242.2192.168.2.4
                                                                            Jan 14, 2025 21:10:33.138586044 CET64028445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:33.143690109 CET44564028116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:33.143795967 CET64028445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:33.143845081 CET64028445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:33.148869991 CET44564028116.151.79.1192.168.2.4
                                                                            Jan 14, 2025 21:10:33.307781935 CET44563772164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:33.307853937 CET63772445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:33.307926893 CET63772445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:33.307948112 CET63772445192.168.2.4164.101.196.1
                                                                            Jan 14, 2025 21:10:33.312954903 CET44563772164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:33.312971115 CET44563772164.101.196.1192.168.2.4
                                                                            Jan 14, 2025 21:10:34.731132984 CET44563776161.211.120.1192.168.2.4
                                                                            Jan 14, 2025 21:10:34.731256008 CET63776445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:34.760704041 CET4456377727.11.108.1192.168.2.4
                                                                            Jan 14, 2025 21:10:34.760773897 CET63777445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:34.902190924 CET4456377946.252.216.2192.168.2.4
                                                                            Jan 14, 2025 21:10:34.902280092 CET63779445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:34.902961016 CET44564015115.92.242.2192.168.2.4
                                                                            Jan 14, 2025 21:10:34.903028011 CET64015445192.168.2.4115.92.242.2
                                                                            Jan 14, 2025 21:10:35.724159956 CET63835445192.168.2.430.170.238.1
                                                                            Jan 14, 2025 21:10:35.724211931 CET63797445192.168.2.4200.22.137.2
                                                                            Jan 14, 2025 21:10:35.724253893 CET63849445192.168.2.4162.197.230.2
                                                                            Jan 14, 2025 21:10:35.724303961 CET63777445192.168.2.427.11.108.1
                                                                            Jan 14, 2025 21:10:35.724327087 CET63779445192.168.2.446.252.216.2
                                                                            Jan 14, 2025 21:10:35.724380016 CET63788445192.168.2.4209.206.153.2
                                                                            Jan 14, 2025 21:10:35.724400997 CET63945445192.168.2.4212.144.65.2
                                                                            Jan 14, 2025 21:10:35.724457026 CET63776445192.168.2.4161.211.120.1
                                                                            Jan 14, 2025 21:10:35.724498034 CET63783445192.168.2.456.74.217.1
                                                                            Jan 14, 2025 21:10:35.724533081 CET63786445192.168.2.473.80.3.1
                                                                            Jan 14, 2025 21:10:35.724556923 CET63782445192.168.2.448.251.159.1
                                                                            Jan 14, 2025 21:10:35.724558115 CET63791445192.168.2.4111.9.60.1
                                                                            Jan 14, 2025 21:10:35.724595070 CET63792445192.168.2.4207.63.162.1
                                                                            Jan 14, 2025 21:10:35.724601984 CET63795445192.168.2.4160.200.14.1
                                                                            Jan 14, 2025 21:10:35.724649906 CET63800445192.168.2.441.59.15.1
                                                                            Jan 14, 2025 21:10:35.724677086 CET63804445192.168.2.4128.149.196.1
                                                                            Jan 14, 2025 21:10:35.724687099 CET63806445192.168.2.4169.136.170.2
                                                                            Jan 14, 2025 21:10:35.724739075 CET63815445192.168.2.4102.51.132.1
                                                                            Jan 14, 2025 21:10:35.724761963 CET63818445192.168.2.419.230.79.1
                                                                            Jan 14, 2025 21:10:35.724798918 CET63826445192.168.2.410.31.243.1
                                                                            Jan 14, 2025 21:10:35.724813938 CET63830445192.168.2.4119.53.67.2
                                                                            Jan 14, 2025 21:10:35.724834919 CET63809445192.168.2.4164.242.37.1
                                                                            Jan 14, 2025 21:10:35.724929094 CET63858445192.168.2.4184.137.238.1
                                                                            Jan 14, 2025 21:10:35.724931955 CET63883445192.168.2.4120.231.161.1
                                                                            Jan 14, 2025 21:10:35.724952936 CET63878445192.168.2.493.206.31.2
                                                                            Jan 14, 2025 21:10:35.724953890 CET63860445192.168.2.4213.182.137.2
                                                                            Jan 14, 2025 21:10:35.724984884 CET63903445192.168.2.480.208.52.2
                                                                            Jan 14, 2025 21:10:35.725002050 CET63918445192.168.2.438.75.111.1
                                                                            Jan 14, 2025 21:10:35.725056887 CET64028445192.168.2.4116.151.79.1
                                                                            Jan 14, 2025 21:10:35.725146055 CET64015445192.168.2.4115.92.242.2
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jan 14, 2025 21:09:29.601963997 CET5136653192.168.2.41.1.1.1
                                                                            Jan 14, 2025 21:09:29.611562014 CET53513661.1.1.1192.168.2.4
                                                                            Jan 14, 2025 21:09:43.990508080 CET138138192.168.2.4192.168.2.255
                                                                            Jan 14, 2025 21:10:11.426939011 CET5363973162.159.36.2192.168.2.4
                                                                            Jan 14, 2025 21:10:11.928272009 CET53563181.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Jan 14, 2025 21:09:29.601963997 CET192.168.2.41.1.1.10x7335Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Jan 14, 2025 21:09:29.611562014 CET1.1.1.1192.168.2.40x7335No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                                                            Jan 14, 2025 21:09:29.611562014 CET1.1.1.1192.168.2.40x7335No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                                                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.449730104.16.166.228807652C:\Windows\mssecsvc.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Jan 14, 2025 21:09:29.622847080 CET100OUTGET / HTTP/1.1
                                                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                            Cache-Control: no-cache
                                                                            Jan 14, 2025 21:09:30.112422943 CET778INHTTP/1.1 200 OK
                                                                            Date: Tue, 14 Jan 2025 20:09:30 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 607
                                                                            Connection: close
                                                                            Server: cloudflare
                                                                            CF-RAY: 9020439acb7a7287-EWR
                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.449731104.16.166.228807700C:\Windows\mssecsvc.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Jan 14, 2025 21:09:30.310789108 CET100OUTGET / HTTP/1.1
                                                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                            Cache-Control: no-cache
                                                                            Jan 14, 2025 21:09:30.805015087 CET778INHTTP/1.1 200 OK
                                                                            Date: Tue, 14 Jan 2025 20:09:30 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 607
                                                                            Connection: close
                                                                            Server: cloudflare
                                                                            CF-RAY: 9020439f1c1f8c51-EWR
                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            2192.168.2.449750104.16.166.228807884C:\Windows\mssecsvc.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Jan 14, 2025 21:09:32.455374002 CET100OUTGET / HTTP/1.1
                                                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                            Cache-Control: no-cache
                                                                            Jan 14, 2025 21:09:32.952001095 CET778INHTTP/1.1 200 OK
                                                                            Date: Tue, 14 Jan 2025 20:09:32 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 607
                                                                            Connection: close
                                                                            Server: cloudflare
                                                                            CF-RAY: 902043ac7aa7de95-EWR
                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:15:09:28
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\System32\loaddll32.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:loaddll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll"
                                                                            Imagebase:0xfe0000
                                                                            File size:126'464 bytes
                                                                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:1
                                                                            Start time:15:09:28
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:2
                                                                            Start time:15:09:28
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:3
                                                                            Start time:15:09:28
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:rundll32.exe C:\Users\user\Desktop\9nNO3SHiV1.dll,PlayGame
                                                                            Imagebase:0xb0000
                                                                            File size:61'440 bytes
                                                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:4
                                                                            Start time:15:09:28
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",#1
                                                                            Imagebase:0xb0000
                                                                            File size:61'440 bytes
                                                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:5
                                                                            Start time:15:09:28
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\mssecsvc.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\WINDOWS\mssecsvc.exe
                                                                            Imagebase:0x400000
                                                                            File size:3'723'264 bytes
                                                                            MD5 hash:11D821B793DBFC5AC4CCE2752A77F6C6
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1740276276.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1740425126.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1740425126.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:6
                                                                            Start time:15:09:29
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\mssecsvc.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                                                            Imagebase:0x400000
                                                                            File size:3'723'264 bytes
                                                                            MD5 hash:11D821B793DBFC5AC4CCE2752A77F6C6
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1747953358.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1748094778.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1748094778.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2393946101.0000000001FFD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2393946101.0000000001FFD000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2394278077.0000000002522000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2394278077.0000000002522000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:7
                                                                            Start time:15:09:30
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\tasksche.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\WINDOWS\tasksche.exe /i
                                                                            Imagebase:0x400000
                                                                            File size:3'514'368 bytes
                                                                            MD5 hash:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1759205215.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                                            • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                                            Antivirus matches:
                                                                            • Detection: 100%, Avira
                                                                            • Detection: 100%, Joe Sandbox ML
                                                                            • Detection: 100%, ReversingLabs
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:8
                                                                            Start time:15:09:31
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:rundll32.exe "C:\Users\user\Desktop\9nNO3SHiV1.dll",PlayGame
                                                                            Imagebase:0xb0000
                                                                            File size:61'440 bytes
                                                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:9
                                                                            Start time:15:09:31
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\mssecsvc.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\WINDOWS\mssecsvc.exe
                                                                            Imagebase:0x400000
                                                                            File size:3'723'264 bytes
                                                                            MD5 hash:11D821B793DBFC5AC4CCE2752A77F6C6
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1778682068.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1769162765.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1778988524.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1778988524.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1769336762.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1769336762.0000000000710000.00000080.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:10
                                                                            Start time:15:09:32
                                                                            Start date:14/01/2025
                                                                            Path:C:\Windows\tasksche.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\WINDOWS\tasksche.exe /i
                                                                            Imagebase:0x400000
                                                                            File size:3'514'368 bytes
                                                                            MD5 hash:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1777970579.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1777294397.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:71.8%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:64.9%
                                                                              Total number of Nodes:37
                                                                              Total number of Limit Nodes:9

                                                                              Callgraph

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                                              • sprintf.MSVCRT ref: 00407E01
                                                                              • sprintf.MSVCRT ref: 00407E18
                                                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                                              • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                                              • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                                              • CreateProcessA.KERNELBASE ref: 00407EE8
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                                              • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.1761463970.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000005.00000002.1761434222.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761493459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761594211.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                                              • API String ID: 4281112323-1507730452
                                                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                                              Control-flow Graph

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.1761463970.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000005.00000002.1761434222.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761493459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761594211.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                              • String ID:
                                                                              • API String ID: 801014965-0
                                                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                                              Strings
                                                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.1761463970.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000005.00000002.1761434222.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761493459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761594211.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                              • API String ID: 774561529-2942426231
                                                                              • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                                                              • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                                                              • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                                                              • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • sprintf.MSVCRT ref: 00407C56
                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.1761463970.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000005.00000002.1761434222.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761493459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761594211.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                                              • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                                              • API String ID: 3340711343-4063779371
                                                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                              • __p___argc.MSVCRT ref: 004080A5
                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.1761463970.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000005.00000002.1761434222.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761493459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761521554.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761594211.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000005.00000002.1761686730.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                                              • String ID: mssecsvc2.0
                                                                              • API String ID: 4274534310-3729025388
                                                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                                              Execution Graph

                                                                              Execution Coverage:34.9%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:0%
                                                                              Total number of Nodes:35
                                                                              Total number of Limit Nodes:2

                                                                              Callgraph

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                              • __p___argc.MSVCRT ref: 004080A5
                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.2392688254.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000006.00000002.2392671559.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392703843.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392776082.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392793769.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                                              • String ID: mssecsvc2.0
                                                                              • API String ID: 4274534310-3729025388
                                                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                                              Strings
                                                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.2392688254.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000006.00000002.2392671559.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392703843.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392776082.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392793769.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                              • API String ID: 774561529-2942426231
                                                                              • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                                                              • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                                                              • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                                                              • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • sprintf.MSVCRT ref: 00407C56
                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.2392688254.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000006.00000002.2392671559.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392703843.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392776082.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392793769.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                                              • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                                              • API String ID: 3340711343-4063779371
                                                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                                              • sprintf.MSVCRT ref: 00407E01
                                                                              • sprintf.MSVCRT ref: 00407E18
                                                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.2392688254.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000006.00000002.2392671559.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392703843.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392776082.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392793769.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                                              • API String ID: 4072214828-1507730452
                                                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                                              Control-flow Graph

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.2392688254.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000006.00000002.2392671559.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392703843.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392718166.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392760811.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392776082.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392793769.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                              • Associated: 00000006.00000002.2392890923.0000000000710000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                              • String ID:
                                                                              • API String ID: 801014965-0
                                                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                                                              APIs
                                                                              • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: memcpy
                                                                              • String ID: /../$/..\$\../$\..\
                                                                              • API String ID: 3510742995-3885502717
                                                                              • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                                              • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                                                              • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                                                              • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                                                              APIs
                                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                                              • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                                              • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                                              • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                                              • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                                              • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                                              • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressProc$LibraryLoad
                                                                              • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                                                              • API String ID: 2238633743-2459060434
                                                                              • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                                              • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                                                              • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                                              • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                                                              APIs
                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                                                              • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                                                              • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                                                              • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandleOpen$ManagerStart
                                                                              • String ID: cmd.exe /c "%s"
                                                                              • API String ID: 1485051382-955883872
                                                                              • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                                              • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                                                              • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                                              • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                                                              APIs
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                                                              • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                                                              • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                                                              • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ??0exception@@ExceptionThrow$memcpy
                                                                              • String ID:
                                                                              • API String ID: 1881450474-3916222277
                                                                              • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                                              • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                                                              • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                                                              • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                                                              APIs
                                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                                                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                                                              • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                                                              • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                                                              • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                                                              • String ID: WANACRY!
                                                                              • API String ID: 283026544-1240840912
                                                                              • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                                              • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                                                              • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                                                              • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                                                              APIs
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                                                              • String ID: $Q;@
                                                                              • API String ID: 2382887404-262343263
                                                                              • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                                              • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                                                              • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                                                              • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                                                              APIs
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                                                              • String ID:
                                                                              • API String ID: 2382887404-3916222277
                                                                              • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                                              • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                                                              • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                                                              • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                                                              APIs
                                                                              • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Heap$FreeProcessfree
                                                                              • String ID:
                                                                              • API String ID: 3428986607-0
                                                                              • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                                              • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                                                              • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                                              • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                                                              APIs
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ??0exception@@ExceptionThrow
                                                                              • String ID:
                                                                              • API String ID: 941485209-0
                                                                              • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                                              • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                                                              • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                                              • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                                                              APIs
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ??0exception@@ExceptionThrow
                                                                              • String ID:
                                                                              • API String ID: 941485209-0
                                                                              • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                                              • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                                                              • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                                              • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: memcpy
                                                                              • String ID:
                                                                              • API String ID: 3510742995-0
                                                                              • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                                              • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                                                              • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                                                              • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                                                              APIs
                                                                              • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ContextCryptRelease
                                                                              • String ID:
                                                                              • API String ID: 829835001-0
                                                                              • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                                              • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                                                              • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                                              • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                                              • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                                                              • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                                              • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                                              • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                                                              • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                                              • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                                                              APIs
                                                                                • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                                                • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                                              • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                                                              • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                                                              • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                                                              • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                                                              • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                                                              • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressProc$LibraryLoad
                                                                              • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                                                              • API String ID: 2238633743-1294736154
                                                                              • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                                              • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                                                              • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                                              • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: %s%s$%s%s%s$:$\
                                                                              • API String ID: 0-1100577047
                                                                              • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                                              • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                                                              • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                                                              • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                                                              APIs
                                                                              • __p___argv.MSVCRT(0040F538), ref: 00402040
                                                                              • strcmp.MSVCRT(?), ref: 0040204B
                                                                              • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                                                              • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                                                                • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                                                              • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                                                              • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                                                              • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                                                                • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                                                • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                                                • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                                                • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                                                              • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                                                              • API String ID: 1074704982-2844324180
                                                                              • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                                              • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                                                              • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                                                              • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                                                              APIs
                                                                              • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                                                              • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                                                              • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                                                              • strlen.MSVCRT(?), ref: 004011A7
                                                                              • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                                                              • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                                                              • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                                                              • String ID: 0@$Software\$WanaCrypt0r
                                                                              • API String ID: 865909632-3421300005
                                                                              • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                                              • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                                                              • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                                              • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                                                              APIs
                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                                              • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                                              • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                                                              • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                                                              • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                                                              • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                                                                • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                                                • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                                                • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                                                • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                                                              • String ID: %s\Intel$%s\ProgramData
                                                                              • API String ID: 3806094219-198707228
                                                                              • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                                              • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                                                              • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                                              • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                                                              APIs
                                                                                • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                                                              • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                                                              • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                                                              • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                                                                • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                                                              • SetLastError.KERNEL32(0000045A), ref: 00402430
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                                                              • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                                                              • API String ID: 1900561814-3657104962
                                                                              • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                                              • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                                                              • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                                                              • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                                                              APIs
                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                                                              • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                                                              • String ID: %s\%s
                                                                              • API String ID: 1036847564-4073750446
                                                                              • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                                              • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                                                              • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                                              • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                                                              APIs
                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                                                              • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                                                              • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                                                              • CloseHandle.KERNEL32(?), ref: 004010EC
                                                                              • CloseHandle.KERNEL32(?), ref: 004010F1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                                                              • String ID: D
                                                                              • API String ID: 786732093-2746444292
                                                                              • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                                              • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                                                              • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                                              • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                                                              APIs
                                                                              • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                                                              • __p__fmode.MSVCRT ref: 004077FC
                                                                              • __p__commode.MSVCRT ref: 0040780A
                                                                              • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                                              • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                                              • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                                                              • String ID:
                                                                              • API String ID: 3626615345-0
                                                                              • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                                              • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                                                              • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                                                              • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                                                              APIs
                                                                              • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                                                                • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                                                              • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                                              • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                                              • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                                              • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                                                              • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                                                              • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                                                              • String ID:
                                                                              • API String ID: 2141228402-0
                                                                              • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                                              • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                                                              • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                                                              • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                                                              APIs
                                                                              • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                                                              • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                                                              • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Read$realloc
                                                                              • String ID: ?!@
                                                                              • API String ID: 1241503663-708128716
                                                                              • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                                              • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                                                              • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                                              • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: rand$wcslen$ComputerNamesrand
                                                                              • String ID:
                                                                              • API String ID: 3058258771-0
                                                                              • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                                              • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                                                              • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                                              • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                                                              APIs
                                                                              • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                                                              • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                                                              • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                                                              • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                                                              • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                                                              • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                                                              • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                                                              • String ID:
                                                                              • API String ID: 2935503933-0
                                                                              • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                                              • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                                                              • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                                                              • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                                                              APIs
                                                                              • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                                                              • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                                                              • Sleep.KERNEL32(000003E8), ref: 00401F40
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseHandleMutexOpenSleepsprintf
                                                                              • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                                                              • API String ID: 2780352083-2959021817
                                                                              • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                                              • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                                                              • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                                              • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                                                              APIs
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                                                              • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                                                              • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ??0exception@@ExceptionThrowmemcpy
                                                                              • String ID:
                                                                              • API String ID: 2382887404-0
                                                                              • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                                              • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                                                              • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                                                              • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                                                              APIs
                                                                              • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                                                              • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                                                              • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                                                              • fclose.MSVCRT(00000000), ref: 00401058
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: fclosefopenfreadfwrite
                                                                              • String ID: c.wnry
                                                                              • API String ID: 4000964834-3240288721
                                                                              • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                                              • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                                                              • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                                              • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                                                              APIs
                                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                                                              • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                                                              • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                                                              • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                                                              • String ID:
                                                                              • API String ID: 2811923685-0
                                                                              • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                                              • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                                                              • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                                                              • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                                                              APIs
                                                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$Pointer$??2@Create
                                                                              • String ID:
                                                                              • API String ID: 1331958074-0
                                                                              • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                                              • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                                                              • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                                              • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                                                              APIs
                                                                              • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                                                              • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast_stricmp
                                                                              • String ID: P!@
                                                                              • API String ID: 1278613211-1774101457
                                                                              • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                                              • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                                                              • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                                                              • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                                                              APIs
                                                                              • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                                                              • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AttributesFilestrcmp
                                                                              • String ID: c.wnry
                                                                              • API String ID: 3324900478-3240288721
                                                                              • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                                              • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                                                              • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                                                              • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                                                              APIs
                                                                              • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ??3@CloseHandle
                                                                              • String ID: $l@
                                                                              • API String ID: 3816424416-2140230165
                                                                              • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                                              • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                                                              • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                                                              • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                                                              APIs
                                                                              • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                                                              • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                                                              • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                                                              • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.1759842863.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000007.00000002.1759817505.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759865993.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759896825.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                              • Associated: 00000007.00000002.1759919218.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CriticalSection$Leave$Entermemcpy
                                                                              • String ID:
                                                                              • API String ID: 3435569088-0
                                                                              • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                                              • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                                                              • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                                                              • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65