Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JRTn7b1kHg.dll

Overview

General Information

Sample name:JRTn7b1kHg.dll
renamed because original name is a hash value
Original sample name:ed979ce49b3373765a91b15c1c37c00b.dll
Analysis ID:1592002
MD5:ed979ce49b3373765a91b15c1c37c00b
SHA1:b8a4489c57cc66f316240394a9236cec927e0e33
SHA256:32c0af5a3035f395db45a739bf97e7025ab7646a9a65ba6f129f20dc46773533
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2260 cmdline: loaddll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1080 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 1276 cmdline: rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1848 cmdline: rundll32.exe C:\Users\user\Desktop\JRTn7b1kHg.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 6004 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 20824BFA05275A0452726AAFBFE0B044)
        • tasksche.exe (PID: 5512 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 7F7CCAA16FB15EB1C7399D422F8363E8)
    • rundll32.exe (PID: 6204 cmdline: rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 4708 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 20824BFA05275A0452726AAFBFE0B044)
        • tasksche.exe (PID: 2072 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 7F7CCAA16FB15EB1C7399D422F8363E8)
  • mssecsvc.exe (PID: 5652 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 20824BFA05275A0452726AAFBFE0B044)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
JRTn7b1kHg.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    JRTn7b1kHg.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    JRTn7b1kHg.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      0000000B.00000002.2102253812.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      0000000A.00000002.2102681023.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000005.00000000.2065324011.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000B.00000000.2101816920.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            7.2.mssecsvc.exe.23d88c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            7.2.mssecsvc.exe.23d88c8.8.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
            • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
            • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
            • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
            10.2.mssecsvc.exe.7100a4.1.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              10.2.mssecsvc.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              10.2.mssecsvc.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 138 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T16:33:07.948731+010020315153Misc activity104.16.166.22880192.168.2.549704TCP
              2025-01-15T16:33:08.621710+010020315153Misc activity104.16.166.22880192.168.2.549705TCP
              2025-01-15T16:33:10.746219+010020315153Misc activity104.16.166.22880192.168.2.549729TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T16:33:07.401680+010020242911A Network Trojan was detected192.168.2.5598371.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T16:33:07.947771+010020242981A Network Trojan was detected192.168.2.549704104.16.166.22880TCP
              2025-01-15T16:33:08.621002+010020242981A Network Trojan was detected192.168.2.549705104.16.166.22880TCP
              2025-01-15T16:33:10.745684+010020242981A Network Trojan was detected192.168.2.549729104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T16:33:07.947771+010020242991A Network Trojan was detected192.168.2.549704104.16.166.22880TCP
              2025-01-15T16:33:08.621002+010020242991A Network Trojan was detected192.168.2.549705104.16.166.22880TCP
              2025-01-15T16:33:10.745684+010020242991A Network Trojan was detected192.168.2.549729104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T16:33:07.947771+010020243011A Network Trojan was detected192.168.2.549704104.16.166.22880TCP
              2025-01-15T16:33:08.621002+010020243011A Network Trojan was detected192.168.2.549705104.16.166.22880TCP
              2025-01-15T16:33:10.745684+010020243011A Network Trojan was detected192.168.2.549729104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T16:33:07.947771+010020243021A Network Trojan was detected192.168.2.549704104.16.166.22880TCP
              2025-01-15T16:33:08.621002+010020243021A Network Trojan was detected192.168.2.549705104.16.166.22880TCP
              2025-01-15T16:33:10.745684+010020243021A Network Trojan was detected192.168.2.549729104.16.166.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-15T16:33:07.947771+010028033043Unknown Traffic192.168.2.549704104.16.166.22880TCP
              2025-01-15T16:33:08.621002+010028033043Unknown Traffic192.168.2.549705104.16.166.22880TCP
              2025-01-15T16:33:10.745684+010028033043Unknown Traffic192.168.2.549729104.16.166.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: JRTn7b1kHg.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/AD.WannaCry.sewvt
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 100%
              Source: C:\WINDOWS\qeriuwjhrf (copy)Virustotal: Detection: 90%Perma Link
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
              Source: C:\Windows\tasksche.exeVirustotal: Detection: 90%Perma Link
              Source: JRTn7b1kHg.dllReversingLabs: Detection: 94%
              Source: JRTn7b1kHg.dllVirustotal: Detection: 91%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: JRTn7b1kHg.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 8_2_004018B9 CryptReleaseContext,8_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: JRTn7b1kHg.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49729 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49729 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49729 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49729 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49704 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49704 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49704 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49704 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.5:49705 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.5:49705 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.5:49705 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.5:49705 -> 104.16.166.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:33:07 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9026ec240f930f8b-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:33:08 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9026ec285c9ef5fa-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 15:33:10 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9026ec35b9cac44f-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.5:59837 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49729 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49704 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.5:49729
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.5:49704
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49705 -> 104.16.166.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.5:49705
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.121
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.121
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.121
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.121
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 74.0.230.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.38
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.38
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.38
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.1
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.1
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.1
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.1
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.1
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.1
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.38
              Source: unknownTCP traffic detected without corresponding DNS query: 15.163.145.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.82
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.82
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.82
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.1
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.1
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.82
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.1
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.1
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.1
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.1
              Source: unknownTCP traffic detected without corresponding DNS query: 34.235.99.1
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.173
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.173
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.173
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.173
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.1
              Source: unknownTCP traffic detected without corresponding DNS query: 145.33.46.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: JRTn7b1kHg.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 0000000A.00000002.2103226526.0000000000C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 00000005.00000002.2083052741.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/.
              Source: mssecsvc.exe, 00000005.00000002.2083052741.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com//
              Source: mssecsvc.exe, 00000005.00000002.2083052741.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
              Source: mssecsvc.exe, 0000000A.00000002.2103226526.0000000000CAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/?
              Source: mssecsvc.exe, 00000007.00000002.2714850346.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 0000000A.00000002.2103226526.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,memcmp,strrchr,GlobalAlloc,_local_unwind2, WANACRY!8_2_004014A6
              Source: C:\Windows\tasksche.exeCode function: strrchr,CreateFileA,GetFileSizeEx,memcmp,strrchr,GlobalAlloc,_local_unwind2, WANACRY!8_2_004014B3
              Source: Yara matchFile source: JRTn7b1kHg.dll, type: SAMPLE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23e7948.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1edb128.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1edb128.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1eb8104.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23e7948.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1eb8104.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.23e38e8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.mssecsvc.exe.1eb40a4.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.2102681023.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.2065324011.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2082281860.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000000.2073470973.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2094368846.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.2102811710.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.2094509627.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2716134237.0000000001EB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.2065485927.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000000.2073588217.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2716998519.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6004, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5652, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4708, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: JRTn7b1kHg.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: JRTn7b1kHg.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.23d88c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23d88c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ea9084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ea9084.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.23e7948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23e7948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.23e7948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1edb128.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1edb128.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1edb128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1edb128.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1edb128.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1edb128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1eb8104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1eb8104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.1eb8104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 7.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.23e7948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23e7948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.1eb8104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1eb8104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.23e38e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.23e38e8.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 7.2.mssecsvc.exe.1eb40a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 7.2.mssecsvc.exe.1eb40a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.2102253812.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.2101816920.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.2080935936.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000002.2102811710.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000A.00000000.2094509627.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2716134237.0000000001EB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000005.00000000.2065485927.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000000.2073588217.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000007.00000002.2716998519.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 8_2_00406C408_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 8_2_00402A768_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 8_2_00402E7E8_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 8_2_0040350F8_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 8_2_00404C198_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 8_2_0040541F8_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 8_2_004037978_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 8_2_004043B78_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 8_2_004031BC8_2_004031BC
              Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
              Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
              Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: JRTn7b1kHg.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: JRTn7b1kHg.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: JRTn7b1kHg.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.23d88c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23d88c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ea9084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ea9084.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.240a96c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1ea9084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.23e7948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23e7948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.23e7948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1edb128.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1edb128.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1edb128.2.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1edb128.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1edb128.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1edb128.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1eb8104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1eb8104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.1eb8104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 7.2.mssecsvc.exe.23d88c8.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.23e7948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23e7948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.1eb8104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1eb8104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.23e38e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.23e38e8.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.240a96c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 7.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 7.2.mssecsvc.exe.1eb40a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 7.2.mssecsvc.exe.1eb40a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.2102253812.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.2101816920.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.2080935936.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000002.2102811710.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000A.00000000.2094509627.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2716134237.0000000001EB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000005.00000000.2065485927.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000000.2073588217.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000007.00000002.2716998519.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000B.00000002.2102253812.000000000040E000.00000008.00000001.01000000.00000007.sdmp, JRTn7b1kHg.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6008:120:WilError_03
              Source: JRTn7b1kHg.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JRTn7b1kHg.dll,PlayGame
              Source: JRTn7b1kHg.dllReversingLabs: Detection: 94%
              Source: JRTn7b1kHg.dllVirustotal: Detection: 91%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JRTn7b1kHg.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JRTn7b1kHg.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: JRTn7b1kHg.dllStatic file information: File size 5267459 > 1048576
              Source: JRTn7b1kHg.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 8_2_00407710 push eax; ret 8_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 8_2_004076C8 push eax; ret 8_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6600Thread sleep count: 94 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6600Thread sleep time: -188000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6640Thread sleep count: 128 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6640Thread sleep count: 40 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 6600Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000005.00000002.2083052741.0000000000D85000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.2083052741.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.2715641385.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000003.2080320319.0000000000D08000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000007.00000002.2715641385.0000000000D08000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.2103226526.0000000000CB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000005.00000002.2083052741.0000000000DB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW+m'
              Source: mssecsvc.exe, 0000000A.00000002.2103226526.0000000000C58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Windows\tasksche.exeCode function: 8_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 8_2_004029CC free,GetProcessHeap,HeapFree,8_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592002 Sample: JRTn7b1kHg.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 41 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->41 59 Tries to download HTTP data from a sinkholed server 2->59 61 Suricata IDS alerts for network traffic 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 6 other signatures 2->65 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        17 rundll32.exe 9->17         started        20 cmd.exe 1 9->20         started        22 conhost.exe 9->22         started        43 192.168.2.102 unknown unknown 11->43 45 192.168.2.103 unknown unknown 11->45 47 98 other IPs or domains 11->47 69 Connects to many different private IPs via SMB (likely to spread or exploit) 11->69 71 Connects to many different private IPs (likely to spread or exploit) 11->71 signatures6 process7 signatures8 24 mssecsvc.exe 7 15->24         started        57 Drops executables to the windows directory (C:\Windows) and starts them 17->57 27 mssecsvc.exe 7 17->27         started        30 rundll32.exe 1 20->30         started        process9 file10 37 C:\Windows\tasksche.exe, PE32 24->37 dropped 32 tasksche.exe 24->32         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 67 Drops executables to the windows directory (C:\Windows) and starts them 27->67 35 tasksche.exe 27->35         started        signatures11 process12 signatures13 49 Detected Wannacry Ransomware 32->49 51 Antivirus detection for dropped file 32->51 53 Multi AV Scanner detection for dropped file 32->53 55 Machine Learning detection for dropped file 32->55

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              JRTn7b1kHg.dll95%ReversingLabsWin32.Ransomware.WannaCry
              JRTn7b1kHg.dll91%VirustotalBrowse
              JRTn7b1kHg.dll100%AviraTR/AD.WannaCry.zbqny
              JRTn7b1kHg.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/AD.WannaCry.sewvt
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)100%ReversingLabsWin32.Ransomware.WannaCry
              C:\WINDOWS\qeriuwjhrf (copy)90%VirustotalBrowse
              C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe90%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.166.228
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJRTn7b1kHg.dllfalse
                    high
                    https://www.kryptoslogic.commssecsvc.exe, 0000000A.00000002.2103226526.0000000000CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/.mssecsvc.exe, 00000005.00000002.2083052741.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com//mssecsvc.exe, 00000005.00000002.2083052741.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/?mssecsvc.exe, 0000000A.00000002.2103226526.0000000000CAC000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000005.00000002.2083052741.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000007.00000002.2714850346.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                155.203.74.1
                                unknownUnited States
                                54036CHES-NETUSfalse
                                59.14.88.1
                                unknownKorea Republic of
                                4766KIXS-AS-KRKoreaTelecomKRfalse
                                34.235.99.82
                                unknownUnited States
                                14618AMAZON-AESUSfalse
                                210.39.38.201
                                unknownChina
                                4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                35.88.223.132
                                unknownUnited States
                                237MERIT-AS-14USfalse
                                181.205.225.248
                                unknownColombia
                                27831ColombiaMovilCOfalse
                                15.163.145.2
                                unknownUnited States
                                71HP-INTERNET-ASUSfalse
                                74.0.230.2
                                unknownUnited States
                                18566MEGAPATH5-USfalse
                                104.211.2.237
                                unknownUnited States
                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                74.0.230.1
                                unknownUnited States
                                18566MEGAPATH5-USfalse
                                59.14.88.65
                                unknownKorea Republic of
                                4766KIXS-AS-KRKoreaTelecomKRfalse
                                15.163.145.1
                                unknownUnited States
                                71HP-INTERNET-ASUSfalse
                                99.122.129.94
                                unknownUnited States
                                7018ATT-INTERNET4USfalse
                                145.33.46.173
                                unknownNetherlands
                                1103SURFNET-NLSURFnetTheNetherlandsNLfalse
                                176.211.243.2
                                unknownRussian Federation
                                12389ROSTELECOM-ASRUfalse
                                176.211.243.1
                                unknownRussian Federation
                                12389ROSTELECOM-ASRUfalse
                                17.237.114.1
                                unknownUnited States
                                714APPLE-ENGINEERINGUSfalse
                                221.20.95.1
                                unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                                35.88.223.1
                                unknownUnited States
                                237MERIT-AS-14USfalse
                                15.163.145.38
                                unknownUnited States
                                71HP-INTERNET-ASUSfalse
                                176.211.243.106
                                unknownRussian Federation
                                12389ROSTELECOM-ASRUfalse
                                74.0.230.121
                                unknownUnited States
                                18566MEGAPATH5-USfalse
                                IP
                                192.168.2.148
                                192.168.2.149
                                192.168.2.146
                                192.168.2.147
                                192.168.2.140
                                192.168.2.141
                                192.168.2.144
                                192.168.2.145
                                192.168.2.142
                                192.168.2.143
                                192.168.2.159
                                192.168.2.157
                                192.168.2.158
                                192.168.2.151
                                192.168.2.152
                                192.168.2.150
                                192.168.2.155
                                192.168.2.156
                                192.168.2.153
                                192.168.2.154
                                192.168.2.126
                                192.168.2.247
                                192.168.2.127
                                192.168.2.248
                                192.168.2.124
                                192.168.2.245
                                192.168.2.125
                                192.168.2.246
                                192.168.2.128
                                192.168.2.249
                                192.168.2.129
                                192.168.2.240
                                192.168.2.122
                                192.168.2.243
                                192.168.2.123
                                192.168.2.244
                                192.168.2.120
                                192.168.2.241
                                192.168.2.121
                                192.168.2.242
                                192.168.2.97
                                192.168.2.137
                                192.168.2.96
                                192.168.2.138
                                192.168.2.99
                                192.168.2.135
                                192.168.2.98
                                192.168.2.136
                                192.168.2.139
                                192.168.2.250
                                192.168.2.130
                                192.168.2.251
                                192.168.2.91
                                192.168.2.90
                                192.168.2.93
                                192.168.2.133
                                192.168.2.254
                                192.168.2.92
                                192.168.2.134
                                192.168.2.95
                                192.168.2.131
                                192.168.2.252
                                192.168.2.94
                                192.168.2.132
                                192.168.2.253
                                192.168.2.104
                                192.168.2.225
                                192.168.2.105
                                192.168.2.226
                                192.168.2.102
                                192.168.2.223
                                192.168.2.103
                                192.168.2.224
                                192.168.2.108
                                192.168.2.229
                                192.168.2.109
                                192.168.2.106
                                192.168.2.227
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1592002
                                Start date and time:2025-01-15 16:32:12 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 28s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:14
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:JRTn7b1kHg.dll
                                renamed because original name is a hash value
                                Original Sample Name:ed979ce49b3373765a91b15c1c37c00b.dll
                                Detection:MAL
                                Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:Failed
                                Cookbook Comments:
                                • Found application associated with file extension: .dll
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                • Excluded IPs from analysis (whitelisted): 199.232.214.172, 2.23.77.188, 199.232.210.172, 13.107.246.45, 172.202.163.200
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target tasksche.exe, PID 5512 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                10:33:08API Interceptor1x Sleep call for process: loaddll32.exe modified
                                10:33:41API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comalN48K3xcD.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                XB6SkLK7Al.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                6fRzgDuqWT.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                KIXS-AS-KRKoreaTelecomKRarm5.elfGet hashmaliciousMiraiBrowse
                                • 221.162.29.171
                                m68k.elfGet hashmaliciousMiraiBrowse
                                • 14.34.74.157
                                xd.arm.elfGet hashmaliciousMiraiBrowse
                                • 119.196.179.54
                                xd.mips.elfGet hashmaliciousMiraiBrowse
                                • 118.235.135.134
                                xd.sh4.elfGet hashmaliciousMiraiBrowse
                                • 59.8.222.40
                                xd.arm7.elfGet hashmaliciousMiraiBrowse
                                • 220.91.205.254
                                xd.x86.elfGet hashmaliciousMiraiBrowse
                                • 183.102.50.33
                                xd.spc.elfGet hashmaliciousMiraiBrowse
                                • 218.154.88.6
                                xd.ppc.elfGet hashmaliciousMiraiBrowse
                                • 175.232.134.156
                                xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                • 14.50.126.1
                                CHES-NETUSbotnet.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                • 155.203.5.90
                                sora.arm7.elfGet hashmaliciousMiraiBrowse
                                • 155.203.5.97
                                iFTZfjcn8I.elfGet hashmaliciousMiraiBrowse
                                • 155.203.5.62
                                h08xdwuTfW.elfGet hashmaliciousUnknownBrowse
                                • 155.203.5.93
                                QRE3h2SSev.elfGet hashmaliciousMirai, GafgytBrowse
                                • 155.203.5.43
                                sora.arm.elfGet hashmaliciousMiraiBrowse
                                • 155.203.5.95
                                wm36mrmQVE.elfGet hashmaliciousMiraiBrowse
                                • 155.203.5.34
                                mips.elfGet hashmaliciousMiraiBrowse
                                • 155.203.5.93
                                EnB99nh8gq.elfGet hashmaliciousMiraiBrowse
                                • 155.203.5.42
                                rdYpUD5FQf.elfGet hashmaliciousMiraiBrowse
                                • 155.203.5.81
                                AMAZON-AESUShttps://shunnarah.com/attorney/candace-t-brownGet hashmaliciousUnknownBrowse
                                • 34.238.149.65
                                m68k.elfGet hashmaliciousMiraiBrowse
                                • 54.28.188.116
                                xd.mips.elfGet hashmaliciousMiraiBrowse
                                • 54.42.8.145
                                https://www.databreachtoday.com/showOnDemand.php?webinarID=6054&rf=OD_REQUEST;Get hashmaliciousUnknownBrowse
                                • 35.175.32.137
                                https://xdcfvg.blob.core.windows.net/lightsd/laifty.htmlGet hashmaliciousUnknownBrowse
                                • 44.223.221.182
                                arm4.elfGet hashmaliciousMiraiBrowse
                                • 54.27.198.234
                                spc.elfGet hashmaliciousMiraiBrowse
                                • 54.61.165.36
                                x86_64.elfGet hashmaliciousMiraiBrowse
                                • 54.145.205.219
                                https://yjdjraabb.cc.rs6.net/tn.jsp?f=001cD7EmEKntgjghgQWpq9s2lW_mstWA0PSxRR7i3h0LbK5HgiPx3gu3HduoBs_Rnxmx0i7FlZL9378mrMLd5LlF6GT3bXi2U8GDrXfdsc2qPaLW94j0wm6KbaRHgZvZZRsEDv_wILG0rjmaLTfE5xpKJl15r5SI1xPSSiQsd9YUqKeemOHvTBSlSwV6tHZZ755Z52-jrPWl0FY7ZZ-PKGQ_IxPzhJqeaH15y4Vkailf2jrOpi4MibpjQ==&c=wK30YrUWFPbHl2B1oEErLYSqPkydS65M2el3xt7vMb11ny4WQ0yJgQ==&ch=8IgRaXvzzpu7qgxKTkXdqoYWo2ml_yYytv3GcZQiibggV2wrl_cJAA==Get hashmaliciousUnknownBrowse
                                • 50.16.151.22
                                Personliche Nachricht fur e4060738.pdfGet hashmaliciousUnknownBrowse
                                • 44.221.186.34
                                ERX-CERNET-BKBChinaEducationandResearchNetworkCenterarm5.elfGet hashmaliciousMiraiBrowse
                                • 49.122.176.54
                                i486.elfGet hashmaliciousMiraiBrowse
                                • 219.245.251.243
                                xd.arm.elfGet hashmaliciousMiraiBrowse
                                • 218.193.82.69
                                xd.sh4.elfGet hashmaliciousMiraiBrowse
                                • 222.200.203.195
                                sh4.elfGet hashmaliciousMiraiBrowse
                                • 125.219.170.30
                                arm4.elfGet hashmaliciousMiraiBrowse
                                • 211.81.11.203
                                x86_64.elfGet hashmaliciousMiraiBrowse
                                • 202.202.204.242
                                ppc.elfGet hashmaliciousMiraiBrowse
                                • 202.206.246.92
                                NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
                                • 202.206.2.7
                                FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                                • 58.155.88.1
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\WINDOWS\qeriuwjhrf (copy)S8LDvVdtOk.dllGet hashmaliciousWannacryBrowse
                                  9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                    zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                      zyeX8bTkky.dllGet hashmaliciousWannacryBrowse
                                        qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                          1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                            qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                              stN592INV6.exeGet hashmaliciousWannacryBrowse
                                                onq54JS79W.exeGet hashmaliciousWannacryBrowse
                                                  mbXvGlj2dR.dllGet hashmaliciousWannacryBrowse
                                                    C:\Windows\tasksche.exeS8LDvVdtOk.dllGet hashmaliciousWannacryBrowse
                                                      9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                                        zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                                          zyeX8bTkky.dllGet hashmaliciousWannacryBrowse
                                                            qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                                              1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                                                qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                                                  stN592INV6.exeGet hashmaliciousWannacryBrowse
                                                                    onq54JS79W.exeGet hashmaliciousWannacryBrowse
                                                                      mbXvGlj2dR.dllGet hashmaliciousWannacryBrowse
                                                                        Process:C:\Windows\mssecsvc.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):3514368
                                                                        Entropy (8bit):7.996072890929898
                                                                        Encrypted:true
                                                                        SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                                                        MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                        SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                                                        SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                                                        SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                                        • Antivirus: Virustotal, Detection: 90%, Browse
                                                                        Joe Sandbox View:
                                                                        • Filename: S8LDvVdtOk.dll, Detection: malicious, Browse
                                                                        • Filename: 9nNO3SHiV1.dll, Detection: malicious, Browse
                                                                        • Filename: zbRmQrzaHY.dll, Detection: malicious, Browse
                                                                        • Filename: zyeX8bTkky.dll, Detection: malicious, Browse
                                                                        • Filename: qt680eucI4.dll, Detection: malicious, Browse
                                                                        • Filename: 1w3BDu68Sg.dll, Detection: malicious, Browse
                                                                        • Filename: qCc1a4w5YZ.exe, Detection: malicious, Browse
                                                                        • Filename: stN592INV6.exe, Detection: malicious, Browse
                                                                        • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                                                        • Filename: mbXvGlj2dR.dll, Detection: malicious, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\mssecsvc.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):3514368
                                                                        Entropy (8bit):7.996072890929898
                                                                        Encrypted:true
                                                                        SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2Hj:QqPe1Cxcxk3ZAEUadzR8yc4Hj
                                                                        MD5:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                        SHA1:BD44D0AB543BF814D93B719C24E90D8DD7111234
                                                                        SHA-256:2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
                                                                        SHA-512:83E334B80DE08903CFA9891A3FA349C1ECE7E19F8E62B74A017512FA9A7989A0FD31929BF1FC13847BEE04F2DA3DACF6BC3F5EE58F0E4B9D495F4B9AF12ED2B7
                                                                        Malicious:true
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                                        Antivirus:
                                                                        • Antivirus: Avira, Detection: 100%
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                                        • Antivirus: Virustotal, Detection: 90%, Browse
                                                                        Joe Sandbox View:
                                                                        • Filename: S8LDvVdtOk.dll, Detection: malicious, Browse
                                                                        • Filename: 9nNO3SHiV1.dll, Detection: malicious, Browse
                                                                        • Filename: zbRmQrzaHY.dll, Detection: malicious, Browse
                                                                        • Filename: zyeX8bTkky.dll, Detection: malicious, Browse
                                                                        • Filename: qt680eucI4.dll, Detection: malicious, Browse
                                                                        • Filename: 1w3BDu68Sg.dll, Detection: malicious, Browse
                                                                        • Filename: qCc1a4w5YZ.exe, Detection: malicious, Browse
                                                                        • Filename: stN592INV6.exe, Detection: malicious, Browse
                                                                        • Filename: onq54JS79W.exe, Detection: malicious, Browse
                                                                        • Filename: mbXvGlj2dR.dll, Detection: malicious, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):6.412629384297933
                                                                        TrID:
                                                                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                                                        • DOS Executable Generic (2002/1) 0.20%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:JRTn7b1kHg.dll
                                                                        File size:5'267'459 bytes
                                                                        MD5:ed979ce49b3373765a91b15c1c37c00b
                                                                        SHA1:b8a4489c57cc66f316240394a9236cec927e0e33
                                                                        SHA256:32c0af5a3035f395db45a739bf97e7025ab7646a9a65ba6f129f20dc46773533
                                                                        SHA512:b6525fff58e5754896f49dec7d4cfced7aed93ff2d367b20cb8e660dd6a176cd48a7704057e0b7c895495c1aae8c3573433ef65478ad5bbd653d40de03c3d2b5
                                                                        SSDEEP:98304:dDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:dDqPe1Cxcxk3ZAEUadzR8yc4H
                                                                        TLSH:3B363394622CB2FCF0440EB44463896BB7B33C6967BA5E1F8BC086670D43B5BAFD0641
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                                        Icon Hash:7ae282899bbab082
                                                                        Entrypoint:0x100011e9
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x10000000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                                        DLL Characteristics:
                                                                        Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                                        Instruction
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        push ebx
                                                                        mov ebx, dword ptr [ebp+08h]
                                                                        push esi
                                                                        mov esi, dword ptr [ebp+0Ch]
                                                                        push edi
                                                                        mov edi, dword ptr [ebp+10h]
                                                                        test esi, esi
                                                                        jne 00007F37B46FD0FBh
                                                                        cmp dword ptr [10003140h], 00000000h
                                                                        jmp 00007F37B46FD118h
                                                                        cmp esi, 01h
                                                                        je 00007F37B46FD0F7h
                                                                        cmp esi, 02h
                                                                        jne 00007F37B46FD114h
                                                                        mov eax, dword ptr [10003150h]
                                                                        test eax, eax
                                                                        je 00007F37B46FD0FBh
                                                                        push edi
                                                                        push esi
                                                                        push ebx
                                                                        call eax
                                                                        test eax, eax
                                                                        je 00007F37B46FD0FEh
                                                                        push edi
                                                                        push esi
                                                                        push ebx
                                                                        call 00007F37B46FD00Ah
                                                                        test eax, eax
                                                                        jne 00007F37B46FD0F6h
                                                                        xor eax, eax
                                                                        jmp 00007F37B46FD140h
                                                                        push edi
                                                                        push esi
                                                                        push ebx
                                                                        call 00007F37B46FCEBCh
                                                                        cmp esi, 01h
                                                                        mov dword ptr [ebp+0Ch], eax
                                                                        jne 00007F37B46FD0FEh
                                                                        test eax, eax
                                                                        jne 00007F37B46FD129h
                                                                        push edi
                                                                        push eax
                                                                        push ebx
                                                                        call 00007F37B46FCFE6h
                                                                        test esi, esi
                                                                        je 00007F37B46FD0F7h
                                                                        cmp esi, 03h
                                                                        jne 00007F37B46FD118h
                                                                        push edi
                                                                        push esi
                                                                        push ebx
                                                                        call 00007F37B46FCFD5h
                                                                        test eax, eax
                                                                        jne 00007F37B46FD0F5h
                                                                        and dword ptr [ebp+0Ch], eax
                                                                        cmp dword ptr [ebp+0Ch], 00000000h
                                                                        je 00007F37B46FD103h
                                                                        mov eax, dword ptr [10003150h]
                                                                        test eax, eax
                                                                        je 00007F37B46FD0FAh
                                                                        push edi
                                                                        push esi
                                                                        push ebx
                                                                        call eax
                                                                        mov dword ptr [ebp+0Ch], eax
                                                                        mov eax, dword ptr [ebp+0Ch]
                                                                        pop edi
                                                                        pop esi
                                                                        pop ebx
                                                                        pop ebp
                                                                        retn 000Ch
                                                                        jmp dword ptr [10002028h]
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        Programming Language:
                                                                        • [ C ] VS98 (6.0) build 8168
                                                                        • [C++] VS98 (6.0) build 8168
                                                                        • [RES] VS98 (6.0) cvtres build 1720
                                                                        • [LNK] VS98 (6.0) imp/exp build 8168
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rsrc0x40000x5000600x50100070f429ffec9800169e0eb5b58aec32c1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        W0x40600x500000dataEnglishUnited States0.8770942687988281
                                                                        DLLImport
                                                                        KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                                        MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                                        NameOrdinalAddress
                                                                        PlayGame10x10001114
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishUnited States
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2025-01-15T16:33:07.401680+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.5598371.1.1.153UDP
                                                                        2025-01-15T16:33:07.947771+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549704104.16.166.22880TCP
                                                                        2025-01-15T16:33:07.947771+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549704104.16.166.22880TCP
                                                                        2025-01-15T16:33:07.947771+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549704104.16.166.22880TCP
                                                                        2025-01-15T16:33:07.947771+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549704104.16.166.22880TCP
                                                                        2025-01-15T16:33:07.947771+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549704104.16.166.22880TCP
                                                                        2025-01-15T16:33:07.948731+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.549704TCP
                                                                        2025-01-15T16:33:08.621002+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549705104.16.166.22880TCP
                                                                        2025-01-15T16:33:08.621002+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549705104.16.166.22880TCP
                                                                        2025-01-15T16:33:08.621002+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549705104.16.166.22880TCP
                                                                        2025-01-15T16:33:08.621002+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549705104.16.166.22880TCP
                                                                        2025-01-15T16:33:08.621002+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549705104.16.166.22880TCP
                                                                        2025-01-15T16:33:08.621710+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.549705TCP
                                                                        2025-01-15T16:33:10.745684+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549729104.16.166.22880TCP
                                                                        2025-01-15T16:33:10.745684+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.549729104.16.166.22880TCP
                                                                        2025-01-15T16:33:10.745684+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.549729104.16.166.22880TCP
                                                                        2025-01-15T16:33:10.745684+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.549729104.16.166.22880TCP
                                                                        2025-01-15T16:33:10.745684+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.549729104.16.166.22880TCP
                                                                        2025-01-15T16:33:10.746219+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.549729TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 15, 2025 16:33:02.341990948 CET49675443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:02.357688904 CET49674443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:02.482722998 CET49673443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:07.418632030 CET4970480192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:07.424443960 CET8049704104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:07.424590111 CET4970480192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:07.424813986 CET4970480192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:07.429742098 CET8049704104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:07.947545052 CET8049704104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:07.947771072 CET4970480192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:07.947858095 CET4970480192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:07.948730946 CET8049704104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:07.948920965 CET4970480192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:07.952600002 CET8049704104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:08.104221106 CET4970580192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:08.109103918 CET8049705104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:08.110522032 CET4970580192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:08.110788107 CET4970580192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:08.115546942 CET8049705104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:08.620934963 CET8049705104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:08.621001959 CET4970580192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:08.621165037 CET4970580192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:08.621710062 CET8049705104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:08.621778011 CET4970580192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:08.626019955 CET8049705104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:08.685038090 CET49706445192.168.2.5210.39.38.201
                                                                        Jan 15, 2025 16:33:08.689909935 CET44549706210.39.38.201192.168.2.5
                                                                        Jan 15, 2025 16:33:08.690001965 CET49706445192.168.2.5210.39.38.201
                                                                        Jan 15, 2025 16:33:08.690781116 CET49706445192.168.2.5210.39.38.201
                                                                        Jan 15, 2025 16:33:08.691006899 CET49707445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:08.695580959 CET44549706210.39.38.201192.168.2.5
                                                                        Jan 15, 2025 16:33:08.695636988 CET49706445192.168.2.5210.39.38.201
                                                                        Jan 15, 2025 16:33:08.695774078 CET44549707210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:08.695844889 CET49707445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:08.695930004 CET49707445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:08.700897932 CET44549707210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:08.700947046 CET49707445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:08.706662893 CET49708445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:08.711466074 CET44549708210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:08.711533070 CET49708445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:08.711563110 CET49708445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:08.717884064 CET44549708210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:10.252326012 CET4972980192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:10.257325888 CET8049729104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:10.257519007 CET4972980192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:10.257705927 CET4972980192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:10.263079882 CET8049729104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:10.691374063 CET49732445192.168.2.574.0.230.121
                                                                        Jan 15, 2025 16:33:10.696557045 CET4454973274.0.230.121192.168.2.5
                                                                        Jan 15, 2025 16:33:10.696630001 CET49732445192.168.2.574.0.230.121
                                                                        Jan 15, 2025 16:33:10.696706057 CET49732445192.168.2.574.0.230.121
                                                                        Jan 15, 2025 16:33:10.696911097 CET49733445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:10.701764107 CET4454973274.0.230.121192.168.2.5
                                                                        Jan 15, 2025 16:33:10.701812983 CET4454973374.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:10.701853037 CET49732445192.168.2.574.0.230.121
                                                                        Jan 15, 2025 16:33:10.701893091 CET49733445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:10.701982021 CET49733445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:10.703119993 CET49734445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:10.706860065 CET4454973374.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:10.706907034 CET49733445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:10.707885981 CET4454973474.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:10.707950115 CET49734445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:10.708050013 CET49734445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:10.712807894 CET4454973474.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:10.745541096 CET8049729104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:10.745683908 CET4972980192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:10.746218920 CET8049729104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:10.746284008 CET4972980192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:10.749892950 CET4972980192.168.2.5104.16.166.228
                                                                        Jan 15, 2025 16:33:10.755531073 CET8049729104.16.166.228192.168.2.5
                                                                        Jan 15, 2025 16:33:11.951373100 CET49675443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:11.966975927 CET49674443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:12.092037916 CET49673443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:12.703246117 CET49757445192.168.2.515.163.145.38
                                                                        Jan 15, 2025 16:33:12.707995892 CET4454975715.163.145.38192.168.2.5
                                                                        Jan 15, 2025 16:33:12.708087921 CET49757445192.168.2.515.163.145.38
                                                                        Jan 15, 2025 16:33:12.708122969 CET49757445192.168.2.515.163.145.38
                                                                        Jan 15, 2025 16:33:12.708350897 CET49758445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:12.713110924 CET4454975815.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:12.713172913 CET49758445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:12.713397026 CET49758445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:12.714735031 CET49759445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:12.715584040 CET4454975715.163.145.38192.168.2.5
                                                                        Jan 15, 2025 16:33:12.719516993 CET4454975915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:12.719600916 CET4454975815.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:12.719607115 CET49759445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:12.719624043 CET49759445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:12.721470118 CET4454975715.163.145.38192.168.2.5
                                                                        Jan 15, 2025 16:33:12.721524000 CET49757445192.168.2.515.163.145.38
                                                                        Jan 15, 2025 16:33:12.721580982 CET4454975815.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:12.721678972 CET49758445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:12.724533081 CET4454975915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:13.762303114 CET4434970323.1.237.91192.168.2.5
                                                                        Jan 15, 2025 16:33:13.762482882 CET49703443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:14.720612049 CET49781445192.168.2.534.235.99.82
                                                                        Jan 15, 2025 16:33:14.727098942 CET4454978134.235.99.82192.168.2.5
                                                                        Jan 15, 2025 16:33:14.727200031 CET49781445192.168.2.534.235.99.82
                                                                        Jan 15, 2025 16:33:14.727272987 CET49781445192.168.2.534.235.99.82
                                                                        Jan 15, 2025 16:33:14.727489948 CET49782445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:14.733098984 CET4454978234.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:14.733160019 CET49782445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:14.733364105 CET4454978134.235.99.82192.168.2.5
                                                                        Jan 15, 2025 16:33:14.733412027 CET49781445192.168.2.534.235.99.82
                                                                        Jan 15, 2025 16:33:14.733707905 CET49782445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:14.735626936 CET49784445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:14.738615990 CET4454978234.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:14.738729954 CET49782445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:14.740398884 CET4454978434.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:14.740469933 CET49784445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:14.740505934 CET49784445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:14.745296001 CET4454978434.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:16.734822035 CET49806445192.168.2.5145.33.46.173
                                                                        Jan 15, 2025 16:33:16.739609003 CET44549806145.33.46.173192.168.2.5
                                                                        Jan 15, 2025 16:33:16.739701986 CET49806445192.168.2.5145.33.46.173
                                                                        Jan 15, 2025 16:33:16.739778996 CET49806445192.168.2.5145.33.46.173
                                                                        Jan 15, 2025 16:33:16.739955902 CET49807445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:16.744635105 CET44549806145.33.46.173192.168.2.5
                                                                        Jan 15, 2025 16:33:16.744704962 CET49806445192.168.2.5145.33.46.173
                                                                        Jan 15, 2025 16:33:16.744754076 CET44549807145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:16.744813919 CET49807445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:16.744858027 CET49807445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:16.746011019 CET49808445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:16.749700069 CET44549807145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:16.749777079 CET49807445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:16.750796080 CET44549808145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:16.750961065 CET49808445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:16.751322031 CET49808445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:16.756055117 CET44549808145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:18.749480009 CET49827445192.168.2.5176.211.243.106
                                                                        Jan 15, 2025 16:33:18.755903006 CET44549827176.211.243.106192.168.2.5
                                                                        Jan 15, 2025 16:33:18.756002903 CET49827445192.168.2.5176.211.243.106
                                                                        Jan 15, 2025 16:33:18.756031990 CET49827445192.168.2.5176.211.243.106
                                                                        Jan 15, 2025 16:33:18.756237984 CET49828445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:18.762521029 CET44549828176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:18.762531042 CET44549827176.211.243.106192.168.2.5
                                                                        Jan 15, 2025 16:33:18.762598991 CET49827445192.168.2.5176.211.243.106
                                                                        Jan 15, 2025 16:33:18.762613058 CET49828445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:18.762695074 CET49828445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:18.763748884 CET49829445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:18.769401073 CET44549828176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:18.769411087 CET44549828176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:18.769462109 CET49828445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:18.770164967 CET44549829176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:18.770226002 CET49829445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:18.770283937 CET49829445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:18.775973082 CET44549829176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:20.764369965 CET49852445192.168.2.5132.245.46.204
                                                                        Jan 15, 2025 16:33:20.769376040 CET44549852132.245.46.204192.168.2.5
                                                                        Jan 15, 2025 16:33:20.769450903 CET49852445192.168.2.5132.245.46.204
                                                                        Jan 15, 2025 16:33:20.769484997 CET49852445192.168.2.5132.245.46.204
                                                                        Jan 15, 2025 16:33:20.769654989 CET49853445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:20.774365902 CET44549853132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:20.774430037 CET49853445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:20.774463892 CET49853445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:20.774466991 CET44549852132.245.46.204192.168.2.5
                                                                        Jan 15, 2025 16:33:20.774519920 CET49852445192.168.2.5132.245.46.204
                                                                        Jan 15, 2025 16:33:20.774873972 CET49854445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:20.782493114 CET44549854132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:20.782560110 CET49854445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:20.782589912 CET49854445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:20.783627033 CET44549853132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:20.787395000 CET44549853132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:20.787405968 CET44549854132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:20.787456989 CET49853445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:22.783371925 CET49884445192.168.2.5181.205.225.248
                                                                        Jan 15, 2025 16:33:22.788239002 CET44549884181.205.225.248192.168.2.5
                                                                        Jan 15, 2025 16:33:22.788407087 CET49884445192.168.2.5181.205.225.248
                                                                        Jan 15, 2025 16:33:22.788486004 CET49884445192.168.2.5181.205.225.248
                                                                        Jan 15, 2025 16:33:22.788777113 CET49885445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:22.793678999 CET44549885181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:22.793775082 CET49885445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:22.793824911 CET49885445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:22.794176102 CET49886445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:22.794749975 CET44549884181.205.225.248192.168.2.5
                                                                        Jan 15, 2025 16:33:22.794816971 CET49884445192.168.2.5181.205.225.248
                                                                        Jan 15, 2025 16:33:22.799118996 CET44549886181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:22.799210072 CET49886445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:22.799256086 CET49886445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:22.799293995 CET44549885181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:22.799344063 CET49885445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:22.804007053 CET44549886181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:24.332824945 CET49703443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:24.332986116 CET49703443192.168.2.523.1.237.91
                                                                        Jan 15, 2025 16:33:24.337764025 CET4434970323.1.237.91192.168.2.5
                                                                        Jan 15, 2025 16:33:24.337851048 CET4434970323.1.237.91192.168.2.5
                                                                        Jan 15, 2025 16:33:24.795619965 CET49921445192.168.2.5164.70.86.43
                                                                        Jan 15, 2025 16:33:24.800772905 CET44549921164.70.86.43192.168.2.5
                                                                        Jan 15, 2025 16:33:24.800852060 CET49921445192.168.2.5164.70.86.43
                                                                        Jan 15, 2025 16:33:24.800908089 CET49921445192.168.2.5164.70.86.43
                                                                        Jan 15, 2025 16:33:24.801022053 CET49922445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:24.805841923 CET44549922164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:24.805875063 CET44549921164.70.86.43192.168.2.5
                                                                        Jan 15, 2025 16:33:24.805902958 CET49922445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:24.805932999 CET49921445192.168.2.5164.70.86.43
                                                                        Jan 15, 2025 16:33:24.806015968 CET49922445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:24.806318998 CET49923445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:24.810858965 CET44549922164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:24.810914040 CET49922445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:24.811119080 CET44549923164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:24.811177969 CET49923445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:24.811249018 CET49923445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:24.816015005 CET44549923164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:26.811471939 CET49961445192.168.2.5126.201.173.239
                                                                        Jan 15, 2025 16:33:26.816343069 CET44549961126.201.173.239192.168.2.5
                                                                        Jan 15, 2025 16:33:26.816422939 CET49961445192.168.2.5126.201.173.239
                                                                        Jan 15, 2025 16:33:26.816500902 CET49961445192.168.2.5126.201.173.239
                                                                        Jan 15, 2025 16:33:26.816735983 CET49962445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:26.821497917 CET44549962126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:26.821511984 CET44549961126.201.173.239192.168.2.5
                                                                        Jan 15, 2025 16:33:26.821563959 CET49962445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:26.821603060 CET49961445192.168.2.5126.201.173.239
                                                                        Jan 15, 2025 16:33:26.821641922 CET49962445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:26.822082996 CET49963445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:26.826555014 CET44549962126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:26.826618910 CET49962445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:26.826828957 CET44549963126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:26.826888084 CET49963445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:26.826934099 CET49963445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:26.831765890 CET44549963126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:28.826905966 CET49995445192.168.2.535.88.223.132
                                                                        Jan 15, 2025 16:33:28.831695080 CET4454999535.88.223.132192.168.2.5
                                                                        Jan 15, 2025 16:33:28.831871986 CET49995445192.168.2.535.88.223.132
                                                                        Jan 15, 2025 16:33:28.831871986 CET49995445192.168.2.535.88.223.132
                                                                        Jan 15, 2025 16:33:28.832048893 CET49996445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:28.836788893 CET4454999635.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:28.836852074 CET49996445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:28.836879969 CET49996445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:28.836885929 CET4454999535.88.223.132192.168.2.5
                                                                        Jan 15, 2025 16:33:28.837097883 CET49995445192.168.2.535.88.223.132
                                                                        Jan 15, 2025 16:33:28.837306976 CET49997445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:28.841717958 CET4454999635.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:28.841804028 CET49996445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:28.842082977 CET4454999735.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:28.842195988 CET49997445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:28.842195988 CET49997445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:28.847069979 CET4454999735.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:30.077198029 CET44549708210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:30.078022957 CET49708445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:30.078136921 CET49708445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:30.078229904 CET49708445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:30.084310055 CET44549708210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:30.084320068 CET44549708210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:30.843110085 CET50034445192.168.2.569.147.41.77
                                                                        Jan 15, 2025 16:33:30.847951889 CET4455003469.147.41.77192.168.2.5
                                                                        Jan 15, 2025 16:33:30.848073006 CET50034445192.168.2.569.147.41.77
                                                                        Jan 15, 2025 16:33:30.848119974 CET50034445192.168.2.569.147.41.77
                                                                        Jan 15, 2025 16:33:30.848341942 CET50035445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:30.853128910 CET4455003469.147.41.77192.168.2.5
                                                                        Jan 15, 2025 16:33:30.853157997 CET4455003569.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:30.853190899 CET50034445192.168.2.569.147.41.77
                                                                        Jan 15, 2025 16:33:30.853225946 CET50035445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:30.853310108 CET50035445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:30.853555918 CET50036445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:30.858186007 CET4455003569.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:30.858251095 CET50035445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:30.858308077 CET4455003669.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:30.858376980 CET50036445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:30.858412981 CET50036445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:30.863177061 CET4455003669.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:32.075887918 CET4454973474.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:32.075993061 CET49734445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:32.076056957 CET49734445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:32.076221943 CET49734445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:32.080802917 CET4454973474.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:32.080941916 CET4454973474.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:32.858232975 CET50069445192.168.2.5180.67.167.166
                                                                        Jan 15, 2025 16:33:32.863957882 CET44550069180.67.167.166192.168.2.5
                                                                        Jan 15, 2025 16:33:32.864022970 CET50069445192.168.2.5180.67.167.166
                                                                        Jan 15, 2025 16:33:32.864090919 CET50069445192.168.2.5180.67.167.166
                                                                        Jan 15, 2025 16:33:32.864233971 CET50070445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:32.869107008 CET44550070180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:32.869376898 CET44550069180.67.167.166192.168.2.5
                                                                        Jan 15, 2025 16:33:32.869415998 CET50070445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:32.869442940 CET50069445192.168.2.5180.67.167.166
                                                                        Jan 15, 2025 16:33:32.869478941 CET50070445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:32.869776011 CET50071445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:32.874443054 CET44550070180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:32.874502897 CET50070445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:32.874593019 CET44550071180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:32.874656916 CET50071445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:32.874690056 CET50071445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:32.879530907 CET44550071180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:33.092238903 CET50077445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:33.097073078 CET44550077210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:33.097157955 CET50077445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:33.097207069 CET50077445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:33.101985931 CET44550077210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:34.118803978 CET4454975915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:34.118877888 CET49759445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:34.118932009 CET49759445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:34.118999958 CET49759445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:34.123704910 CET4454975915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:34.123755932 CET4454975915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:34.873862982 CET50090445192.168.2.599.122.129.94
                                                                        Jan 15, 2025 16:33:34.878755093 CET4455009099.122.129.94192.168.2.5
                                                                        Jan 15, 2025 16:33:34.878861904 CET50090445192.168.2.599.122.129.94
                                                                        Jan 15, 2025 16:33:34.878948927 CET50090445192.168.2.599.122.129.94
                                                                        Jan 15, 2025 16:33:34.879076958 CET50091445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:34.883848906 CET4455009099.122.129.94192.168.2.5
                                                                        Jan 15, 2025 16:33:34.883877993 CET4455009199.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:34.883934021 CET50090445192.168.2.599.122.129.94
                                                                        Jan 15, 2025 16:33:34.883984089 CET50091445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:34.884022951 CET50091445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:34.884262085 CET50092445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:34.888881922 CET4455009199.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:34.888942003 CET50091445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:34.889050961 CET4455009299.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:34.889106989 CET50092445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:34.919075966 CET50092445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:34.924088001 CET4455009299.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:35.080439091 CET50093445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:35.085292101 CET4455009374.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:35.085403919 CET50093445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:35.088093996 CET50093445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:35.092905045 CET4455009374.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:36.087418079 CET4454978434.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:36.087588072 CET49784445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:36.087671995 CET49784445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:36.087757111 CET49784445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:36.092422962 CET4454978434.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:36.092578888 CET4454978434.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:36.889925957 CET50104445192.168.2.511.35.30.128
                                                                        Jan 15, 2025 16:33:36.894747972 CET4455010411.35.30.128192.168.2.5
                                                                        Jan 15, 2025 16:33:36.894836903 CET50104445192.168.2.511.35.30.128
                                                                        Jan 15, 2025 16:33:36.895035028 CET50104445192.168.2.511.35.30.128
                                                                        Jan 15, 2025 16:33:36.895548105 CET50105445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:36.899827003 CET4455010411.35.30.128192.168.2.5
                                                                        Jan 15, 2025 16:33:36.899895906 CET50104445192.168.2.511.35.30.128
                                                                        Jan 15, 2025 16:33:36.900301933 CET4455010511.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:33:36.900531054 CET50105445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:36.900547028 CET50105445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:36.900978088 CET50107445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:36.905499935 CET4455010511.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:33:36.905745983 CET4455010711.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:33:36.905833960 CET50105445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:36.905834913 CET50107445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:36.905951023 CET50107445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:36.910670042 CET4455010711.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:33:37.123724937 CET50109445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:37.128453970 CET4455010915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:37.128513098 CET50109445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:37.128607988 CET50109445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:37.133308887 CET4455010915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.107369900 CET44549808145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.107527971 CET49808445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:38.107676029 CET49808445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:38.107769966 CET49808445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:38.113557100 CET44549808145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.113589048 CET44549808145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.905234098 CET50120445192.168.2.531.119.18.46
                                                                        Jan 15, 2025 16:33:38.910095930 CET4455012031.119.18.46192.168.2.5
                                                                        Jan 15, 2025 16:33:38.910392046 CET50120445192.168.2.531.119.18.46
                                                                        Jan 15, 2025 16:33:38.910418034 CET50120445192.168.2.531.119.18.46
                                                                        Jan 15, 2025 16:33:38.910577059 CET50121445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:33:38.915430069 CET4455012131.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.915515900 CET4455012031.119.18.46192.168.2.5
                                                                        Jan 15, 2025 16:33:38.915585041 CET50120445192.168.2.531.119.18.46
                                                                        Jan 15, 2025 16:33:38.915637970 CET50121445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:33:38.915702105 CET50121445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:33:38.916006088 CET50122445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:33:38.920885086 CET4455012231.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.920964956 CET50122445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:33:38.921003103 CET50122445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:33:38.925807953 CET4455012231.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.927273035 CET4455012131.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:38.927361012 CET50121445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:33:39.092412949 CET50126445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:39.097254992 CET4455012634.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:39.097372055 CET50126445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:39.097476006 CET50126445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:33:39.102287054 CET4455012634.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.136921883 CET44549829176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.136981964 CET49829445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:40.137027025 CET49829445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:40.137096882 CET49829445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:40.141918898 CET44549829176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.142124891 CET44549829176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.920631886 CET50137445192.168.2.550.1.247.3
                                                                        Jan 15, 2025 16:33:40.925473928 CET4455013750.1.247.3192.168.2.5
                                                                        Jan 15, 2025 16:33:40.925627947 CET50137445192.168.2.550.1.247.3
                                                                        Jan 15, 2025 16:33:40.925736904 CET50138445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:33:40.925736904 CET50137445192.168.2.550.1.247.3
                                                                        Jan 15, 2025 16:33:40.930599928 CET4455013850.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.930680990 CET4455013750.1.247.3192.168.2.5
                                                                        Jan 15, 2025 16:33:40.930696011 CET50138445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:33:40.930696964 CET50138445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:33:40.930798054 CET50137445192.168.2.550.1.247.3
                                                                        Jan 15, 2025 16:33:40.930947065 CET50139445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:33:40.935693979 CET4455013850.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.935724020 CET4455013850.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.935775995 CET50138445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:33:40.935807943 CET4455013950.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:33:40.935866117 CET50139445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:33:40.936158895 CET50139445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:33:40.940962076 CET4455013950.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:33:41.123511076 CET50142445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:41.128355980 CET44550142145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:41.128449917 CET50142445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:41.128485918 CET50142445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:33:41.133318901 CET44550142145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:42.171989918 CET44549854132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:42.172065973 CET49854445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:42.172096968 CET49854445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:42.172139883 CET49854445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:42.178606033 CET44549854132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:42.178656101 CET44549854132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:42.936470032 CET50154445192.168.2.517.237.114.102
                                                                        Jan 15, 2025 16:33:42.941427946 CET4455015417.237.114.102192.168.2.5
                                                                        Jan 15, 2025 16:33:42.944616079 CET50154445192.168.2.517.237.114.102
                                                                        Jan 15, 2025 16:33:42.944787979 CET50154445192.168.2.517.237.114.102
                                                                        Jan 15, 2025 16:33:42.944793940 CET50155445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:33:42.949584961 CET4455015517.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:33:42.950205088 CET4455015417.237.114.102192.168.2.5
                                                                        Jan 15, 2025 16:33:42.950314999 CET50154445192.168.2.517.237.114.102
                                                                        Jan 15, 2025 16:33:42.950341940 CET50155445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:33:42.950710058 CET50156445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:33:42.955305099 CET4455015517.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:33:42.955519915 CET4455015617.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:33:42.955599070 CET50155445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:33:42.955621004 CET50156445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:33:42.955655098 CET50156445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:33:42.960400105 CET4455015617.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:33:43.139317989 CET50159445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:43.144089937 CET44550159176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:43.144196987 CET50159445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:43.144273996 CET50159445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:33:43.149000883 CET44550159176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:33:44.168492079 CET44549886181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:44.168663025 CET49886445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:44.168689013 CET49886445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:44.168745995 CET49886445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:44.173579931 CET44549886181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:44.173780918 CET44549886181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:44.811353922 CET50170445192.168.2.5120.174.178.51
                                                                        Jan 15, 2025 16:33:44.816211939 CET44550170120.174.178.51192.168.2.5
                                                                        Jan 15, 2025 16:33:44.816287041 CET50170445192.168.2.5120.174.178.51
                                                                        Jan 15, 2025 16:33:44.816366911 CET50170445192.168.2.5120.174.178.51
                                                                        Jan 15, 2025 16:33:44.816540956 CET50171445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:33:44.821269035 CET44550170120.174.178.51192.168.2.5
                                                                        Jan 15, 2025 16:33:44.821345091 CET50170445192.168.2.5120.174.178.51
                                                                        Jan 15, 2025 16:33:44.821413994 CET44550171120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:33:44.821481943 CET50171445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:33:44.821510077 CET50171445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:33:44.821866035 CET50172445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:33:44.826381922 CET44550171120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:33:44.826443911 CET50171445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:33:44.826663971 CET44550172120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:33:44.826731920 CET50172445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:33:44.826775074 CET50172445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:33:44.831732035 CET44550172120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:33:45.186069012 CET50174445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:45.190893888 CET44550174132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:45.191421032 CET50174445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:45.191457033 CET50174445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:33:45.196235895 CET44550174132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:33:46.185445070 CET44549923164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:46.185523033 CET49923445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:46.185575962 CET49923445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:46.185628891 CET49923445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:46.191059113 CET44549923164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:46.191067934 CET44549923164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:46.561649084 CET50183445192.168.2.5221.20.95.45
                                                                        Jan 15, 2025 16:33:46.611668110 CET44550183221.20.95.45192.168.2.5
                                                                        Jan 15, 2025 16:33:46.611790895 CET50183445192.168.2.5221.20.95.45
                                                                        Jan 15, 2025 16:33:46.612056971 CET50183445192.168.2.5221.20.95.45
                                                                        Jan 15, 2025 16:33:46.612339020 CET50184445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:33:46.617130041 CET44550184221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:33:46.617166042 CET44550183221.20.95.45192.168.2.5
                                                                        Jan 15, 2025 16:33:46.617208958 CET50184445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:33:46.617253065 CET50183445192.168.2.5221.20.95.45
                                                                        Jan 15, 2025 16:33:46.617304087 CET50184445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:33:46.617614031 CET50186445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:33:46.622303009 CET44550184221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:33:46.622349977 CET44550186221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:33:46.622374058 CET50184445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:33:46.622450113 CET50186445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:33:46.626796007 CET50186445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:33:46.631656885 CET44550186221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:33:47.170320988 CET50190445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:47.175081015 CET44550190181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:47.175190926 CET50190445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:47.175209045 CET50190445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:33:47.180062056 CET44550190181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:33:48.201781034 CET50197445192.168.2.548.162.219.252
                                                                        Jan 15, 2025 16:33:48.206527948 CET4455019748.162.219.252192.168.2.5
                                                                        Jan 15, 2025 16:33:48.206602097 CET50197445192.168.2.548.162.219.252
                                                                        Jan 15, 2025 16:33:48.206633091 CET50197445192.168.2.548.162.219.252
                                                                        Jan 15, 2025 16:33:48.206861019 CET50199445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:33:48.211658001 CET4455019748.162.219.252192.168.2.5
                                                                        Jan 15, 2025 16:33:48.211688995 CET4455019948.162.219.1192.168.2.5
                                                                        Jan 15, 2025 16:33:48.211723089 CET50197445192.168.2.548.162.219.252
                                                                        Jan 15, 2025 16:33:48.211762905 CET50199445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:33:48.211817026 CET50199445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:33:48.212045908 CET50200445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:33:48.216778994 CET4455019948.162.219.1192.168.2.5
                                                                        Jan 15, 2025 16:33:48.216841936 CET50199445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:33:48.216968060 CET4455020048.162.219.1192.168.2.5
                                                                        Jan 15, 2025 16:33:48.217025042 CET50200445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:33:48.217092037 CET50200445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:33:48.221913099 CET4455020048.162.219.1192.168.2.5
                                                                        Jan 15, 2025 16:33:48.230168104 CET44549963126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:48.230228901 CET49963445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:48.230252981 CET49963445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:48.230293989 CET49963445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:48.235096931 CET44549963126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:48.235126019 CET44549963126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:49.185949087 CET50207445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:49.190793991 CET44550207164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:49.190871000 CET50207445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:49.190884113 CET50207445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:33:49.195652962 CET44550207164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:33:49.733376980 CET50211445192.168.2.5181.135.148.238
                                                                        Jan 15, 2025 16:33:49.738209009 CET44550211181.135.148.238192.168.2.5
                                                                        Jan 15, 2025 16:33:49.738326073 CET50211445192.168.2.5181.135.148.238
                                                                        Jan 15, 2025 16:33:49.738326073 CET50211445192.168.2.5181.135.148.238
                                                                        Jan 15, 2025 16:33:49.738465071 CET50212445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:33:49.743267059 CET44550212181.135.148.1192.168.2.5
                                                                        Jan 15, 2025 16:33:49.743347883 CET44550211181.135.148.238192.168.2.5
                                                                        Jan 15, 2025 16:33:49.743351936 CET50212445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:33:49.743396044 CET50211445192.168.2.5181.135.148.238
                                                                        Jan 15, 2025 16:33:49.743463993 CET50212445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:33:49.744088888 CET50213445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:33:49.748317957 CET44550212181.135.148.1192.168.2.5
                                                                        Jan 15, 2025 16:33:49.748383999 CET50212445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:33:49.748855114 CET44550213181.135.148.1192.168.2.5
                                                                        Jan 15, 2025 16:33:49.748914957 CET50213445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:33:49.748948097 CET50213445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:33:49.753673077 CET44550213181.135.148.1192.168.2.5
                                                                        Jan 15, 2025 16:33:50.230397940 CET4454999735.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:50.230525970 CET49997445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:50.230591059 CET49997445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:50.230695963 CET49997445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:50.235605001 CET4454999735.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:50.235634089 CET4454999735.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:51.155920982 CET50223445192.168.2.5184.93.96.71
                                                                        Jan 15, 2025 16:33:51.160759926 CET44550223184.93.96.71192.168.2.5
                                                                        Jan 15, 2025 16:33:51.160852909 CET50223445192.168.2.5184.93.96.71
                                                                        Jan 15, 2025 16:33:51.161067963 CET50223445192.168.2.5184.93.96.71
                                                                        Jan 15, 2025 16:33:51.161071062 CET50224445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:33:51.165838003 CET44550224184.93.96.1192.168.2.5
                                                                        Jan 15, 2025 16:33:51.165903091 CET50224445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:33:51.165985107 CET50224445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:33:51.166335106 CET50225445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:33:51.167620897 CET44550223184.93.96.71192.168.2.5
                                                                        Jan 15, 2025 16:33:51.171134949 CET44550225184.93.96.1192.168.2.5
                                                                        Jan 15, 2025 16:33:51.171209097 CET50225445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:33:51.171303988 CET50225445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:33:51.171474934 CET44550223184.93.96.71192.168.2.5
                                                                        Jan 15, 2025 16:33:51.171526909 CET50223445192.168.2.5184.93.96.71
                                                                        Jan 15, 2025 16:33:51.171616077 CET44550224184.93.96.1192.168.2.5
                                                                        Jan 15, 2025 16:33:51.171720982 CET44550224184.93.96.1192.168.2.5
                                                                        Jan 15, 2025 16:33:51.171777964 CET50224445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:33:51.176094055 CET44550225184.93.96.1192.168.2.5
                                                                        Jan 15, 2025 16:33:51.232882977 CET50227445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:51.237669945 CET44550227126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:51.237763882 CET50227445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:51.237801075 CET50227445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:33:51.242604017 CET44550227126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:33:52.265543938 CET4455003669.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:52.265801907 CET50036445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:52.265866995 CET50036445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:52.265866995 CET50036445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:52.270730972 CET4455003669.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:52.270750999 CET4455003669.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:52.483542919 CET50235445192.168.2.5187.171.233.163
                                                                        Jan 15, 2025 16:33:52.488318920 CET44550235187.171.233.163192.168.2.5
                                                                        Jan 15, 2025 16:33:52.488466024 CET50235445192.168.2.5187.171.233.163
                                                                        Jan 15, 2025 16:33:52.488466024 CET50235445192.168.2.5187.171.233.163
                                                                        Jan 15, 2025 16:33:52.488589048 CET50236445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:33:52.493360996 CET44550236187.171.233.1192.168.2.5
                                                                        Jan 15, 2025 16:33:52.493462086 CET44550235187.171.233.163192.168.2.5
                                                                        Jan 15, 2025 16:33:52.493474960 CET50236445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:33:52.493491888 CET50236445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:33:52.493561029 CET50235445192.168.2.5187.171.233.163
                                                                        Jan 15, 2025 16:33:52.493737936 CET50237445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:33:52.498389959 CET44550236187.171.233.1192.168.2.5
                                                                        Jan 15, 2025 16:33:52.498456955 CET50236445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:33:52.498488903 CET44550237187.171.233.1192.168.2.5
                                                                        Jan 15, 2025 16:33:52.498550892 CET50237445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:33:52.498594046 CET50237445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:33:52.503371954 CET44550237187.171.233.1192.168.2.5
                                                                        Jan 15, 2025 16:33:53.233062983 CET50243445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:53.237834930 CET4455024335.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:53.238017082 CET50243445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:53.238101006 CET50243445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:33:53.242887020 CET4455024335.88.223.1192.168.2.5
                                                                        Jan 15, 2025 16:33:53.733525991 CET50248445192.168.2.559.14.88.65
                                                                        Jan 15, 2025 16:33:53.738368988 CET4455024859.14.88.65192.168.2.5
                                                                        Jan 15, 2025 16:33:53.738493919 CET50248445192.168.2.559.14.88.65
                                                                        Jan 15, 2025 16:33:53.738609076 CET50248445192.168.2.559.14.88.65
                                                                        Jan 15, 2025 16:33:53.738745928 CET50249445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:33:53.743446112 CET4455024859.14.88.65192.168.2.5
                                                                        Jan 15, 2025 16:33:53.743505955 CET4455024959.14.88.1192.168.2.5
                                                                        Jan 15, 2025 16:33:53.743513107 CET50248445192.168.2.559.14.88.65
                                                                        Jan 15, 2025 16:33:53.743556976 CET50249445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:33:53.743577957 CET50249445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:33:53.743860960 CET50250445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:33:53.748544931 CET4455024959.14.88.1192.168.2.5
                                                                        Jan 15, 2025 16:33:53.748608112 CET50249445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:33:53.748616934 CET4455025059.14.88.1192.168.2.5
                                                                        Jan 15, 2025 16:33:53.748689890 CET50250445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:33:53.748734951 CET50250445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:33:53.753473043 CET4455025059.14.88.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.260329962 CET44550071180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.260422945 CET50071445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:54.260478020 CET50071445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:54.260531902 CET50071445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:54.265252113 CET44550071180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.265261889 CET44550071180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.466766119 CET44550077210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.466885090 CET50077445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:54.466989994 CET50077445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:54.467767000 CET50077445192.168.2.5210.39.38.1
                                                                        Jan 15, 2025 16:33:54.471719980 CET44550077210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.472527981 CET44550077210.39.38.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.530637980 CET50256445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:33:54.535373926 CET44550256210.39.38.2192.168.2.5
                                                                        Jan 15, 2025 16:33:54.535448074 CET50256445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:33:54.535573959 CET50256445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:33:54.535959959 CET50257445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:33:54.540781975 CET44550257210.39.38.2192.168.2.5
                                                                        Jan 15, 2025 16:33:54.540862083 CET50257445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:33:54.540867090 CET44550256210.39.38.2192.168.2.5
                                                                        Jan 15, 2025 16:33:54.540895939 CET50257445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:33:54.540920019 CET50256445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:33:54.545675039 CET44550257210.39.38.2192.168.2.5
                                                                        Jan 15, 2025 16:33:54.891252995 CET50260445192.168.2.5117.209.18.91
                                                                        Jan 15, 2025 16:33:54.896070004 CET44550260117.209.18.91192.168.2.5
                                                                        Jan 15, 2025 16:33:54.896150112 CET50260445192.168.2.5117.209.18.91
                                                                        Jan 15, 2025 16:33:54.896172047 CET50260445192.168.2.5117.209.18.91
                                                                        Jan 15, 2025 16:33:54.896265030 CET50262445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:54.901026964 CET44550262117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.901078939 CET50262445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:54.901081085 CET44550260117.209.18.91192.168.2.5
                                                                        Jan 15, 2025 16:33:54.901097059 CET50262445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:54.901125908 CET50260445192.168.2.5117.209.18.91
                                                                        Jan 15, 2025 16:33:54.901360989 CET50263445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:54.906172037 CET44550263117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.906232119 CET50263445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:54.906270981 CET50263445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:54.906471014 CET44550262117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:54.906517982 CET50262445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:54.911006927 CET44550263117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:55.279726982 CET50266445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:55.284540892 CET4455026669.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:55.284635067 CET50266445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:55.284668922 CET50266445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:33:55.289390087 CET4455026669.147.41.1192.168.2.5
                                                                        Jan 15, 2025 16:33:55.967469931 CET50271445192.168.2.514.116.193.150
                                                                        Jan 15, 2025 16:33:55.972270966 CET4455027114.116.193.150192.168.2.5
                                                                        Jan 15, 2025 16:33:55.972357988 CET50271445192.168.2.514.116.193.150
                                                                        Jan 15, 2025 16:33:55.972383022 CET50271445192.168.2.514.116.193.150
                                                                        Jan 15, 2025 16:33:55.972553015 CET50272445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:33:55.977392912 CET4455027114.116.193.150192.168.2.5
                                                                        Jan 15, 2025 16:33:55.977406025 CET4455027214.116.193.1192.168.2.5
                                                                        Jan 15, 2025 16:33:55.977478981 CET50271445192.168.2.514.116.193.150
                                                                        Jan 15, 2025 16:33:55.977550983 CET50272445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:33:55.977583885 CET50272445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:33:55.978471041 CET50273445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:33:55.982561111 CET4455027214.116.193.1192.168.2.5
                                                                        Jan 15, 2025 16:33:55.982623100 CET50272445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:33:55.983259916 CET4455027314.116.193.1192.168.2.5
                                                                        Jan 15, 2025 16:33:55.983333111 CET50273445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:33:55.983375072 CET50273445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:33:55.988121986 CET4455027314.116.193.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.263396978 CET4455009299.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.263505936 CET50092445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:56.263541937 CET50092445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:56.263592005 CET50092445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:56.268446922 CET4455009299.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.268488884 CET4455009299.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.431451082 CET4455009374.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.431552887 CET50093445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:56.431597948 CET50093445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:56.431653976 CET50093445192.168.2.574.0.230.1
                                                                        Jan 15, 2025 16:33:56.436501026 CET4455009374.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.436537981 CET4455009374.0.230.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.483042002 CET50277445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:33:56.487907887 CET4455027774.0.230.2192.168.2.5
                                                                        Jan 15, 2025 16:33:56.488090992 CET50277445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:33:56.488090992 CET50277445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:33:56.488482952 CET50278445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:33:56.493160009 CET4455027774.0.230.2192.168.2.5
                                                                        Jan 15, 2025 16:33:56.493278027 CET4455027874.0.230.2192.168.2.5
                                                                        Jan 15, 2025 16:33:56.493319035 CET50277445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:33:56.493417025 CET50278445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:33:56.493417025 CET50278445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:33:56.498251915 CET4455027874.0.230.2192.168.2.5
                                                                        Jan 15, 2025 16:33:56.983230114 CET50282445192.168.2.528.236.197.245
                                                                        Jan 15, 2025 16:33:56.988151073 CET4455028228.236.197.245192.168.2.5
                                                                        Jan 15, 2025 16:33:56.988236904 CET50282445192.168.2.528.236.197.245
                                                                        Jan 15, 2025 16:33:56.988287926 CET50282445192.168.2.528.236.197.245
                                                                        Jan 15, 2025 16:33:56.988440990 CET50283445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:33:56.993309975 CET4455028328.236.197.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.993382931 CET50283445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:33:56.993434906 CET50283445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:33:56.993788004 CET50284445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:33:56.993853092 CET4455028228.236.197.245192.168.2.5
                                                                        Jan 15, 2025 16:33:56.993918896 CET50282445192.168.2.528.236.197.245
                                                                        Jan 15, 2025 16:33:56.998548031 CET4455028328.236.197.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.998620987 CET50283445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:33:56.998702049 CET4455028428.236.197.1192.168.2.5
                                                                        Jan 15, 2025 16:33:56.998768091 CET50284445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:33:56.998792887 CET50284445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:33:57.003962994 CET4455028428.236.197.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.264288902 CET50286445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:57.269108057 CET44550286180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.269238949 CET50286445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:57.269252062 CET50286445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:33:57.274071932 CET44550286180.67.167.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.866266012 CET44550263117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.866547108 CET50263445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:57.866547108 CET50263445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:57.866547108 CET50263445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:33:57.871541023 CET44550263117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.871587038 CET44550263117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.922171116 CET50290445192.168.2.5104.211.2.237
                                                                        Jan 15, 2025 16:33:57.927042961 CET44550290104.211.2.237192.168.2.5
                                                                        Jan 15, 2025 16:33:57.927129984 CET50290445192.168.2.5104.211.2.237
                                                                        Jan 15, 2025 16:33:57.927156925 CET50290445192.168.2.5104.211.2.237
                                                                        Jan 15, 2025 16:33:57.927351952 CET50291445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:33:57.932183981 CET44550290104.211.2.237192.168.2.5
                                                                        Jan 15, 2025 16:33:57.932240009 CET50290445192.168.2.5104.211.2.237
                                                                        Jan 15, 2025 16:33:57.932244062 CET44550291104.211.2.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.932308912 CET50291445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:33:57.932385921 CET50291445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:33:57.932656050 CET50292445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:33:57.937330961 CET44550291104.211.2.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.937386990 CET50291445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:33:57.937427044 CET44550292104.211.2.1192.168.2.5
                                                                        Jan 15, 2025 16:33:57.937499046 CET50292445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:33:57.937544107 CET50292445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:33:57.942748070 CET44550292104.211.2.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.308526039 CET4455010711.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.312674999 CET50107445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:58.312784910 CET50107445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:58.312905073 CET50107445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:33:58.317522049 CET4455010711.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.317713022 CET4455010711.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.494339943 CET4455010915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.494453907 CET50109445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:58.494527102 CET50109445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:58.494597912 CET50109445192.168.2.515.163.145.1
                                                                        Jan 15, 2025 16:33:58.499279022 CET4455010915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.499357939 CET4455010915.163.145.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.561121941 CET50297445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:33:58.565944910 CET4455029715.163.145.2192.168.2.5
                                                                        Jan 15, 2025 16:33:58.566055059 CET50297445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:33:58.566123962 CET50297445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:33:58.566503048 CET50298445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:33:58.571084023 CET4455029715.163.145.2192.168.2.5
                                                                        Jan 15, 2025 16:33:58.571161985 CET50297445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:33:58.571269989 CET4455029815.163.145.2192.168.2.5
                                                                        Jan 15, 2025 16:33:58.571350098 CET50298445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:33:58.571413994 CET50298445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:33:58.576145887 CET4455029815.163.145.2192.168.2.5
                                                                        Jan 15, 2025 16:33:58.811273098 CET50301445192.168.2.510.93.250.130
                                                                        Jan 15, 2025 16:33:58.816127062 CET4455030110.93.250.130192.168.2.5
                                                                        Jan 15, 2025 16:33:58.816601038 CET50301445192.168.2.510.93.250.130
                                                                        Jan 15, 2025 16:33:58.816684008 CET50301445192.168.2.510.93.250.130
                                                                        Jan 15, 2025 16:33:58.816924095 CET50302445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:33:58.821597099 CET4455030110.93.250.130192.168.2.5
                                                                        Jan 15, 2025 16:33:58.821697950 CET4455030210.93.250.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.821760893 CET50301445192.168.2.510.93.250.130
                                                                        Jan 15, 2025 16:33:58.821803093 CET50302445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:33:58.821923971 CET50302445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:33:58.822192907 CET50303445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:33:58.826828003 CET4455030210.93.250.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.826898098 CET50302445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:33:58.827033043 CET4455030310.93.250.1192.168.2.5
                                                                        Jan 15, 2025 16:33:58.827339888 CET50303445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:33:58.827339888 CET50303445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:33:58.832159996 CET4455030310.93.250.1192.168.2.5
                                                                        Jan 15, 2025 16:33:59.264142036 CET50306445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:59.268986940 CET4455030699.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:59.269083977 CET50306445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:59.269172907 CET50306445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:33:59.273936033 CET4455030699.122.129.1192.168.2.5
                                                                        Jan 15, 2025 16:33:59.639530897 CET50310445192.168.2.5109.68.15.138
                                                                        Jan 15, 2025 16:33:59.644290924 CET44550310109.68.15.138192.168.2.5
                                                                        Jan 15, 2025 16:33:59.644406080 CET50310445192.168.2.5109.68.15.138
                                                                        Jan 15, 2025 16:33:59.644539118 CET50311445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:33:59.644551992 CET50310445192.168.2.5109.68.15.138
                                                                        Jan 15, 2025 16:33:59.649346113 CET44550310109.68.15.138192.168.2.5
                                                                        Jan 15, 2025 16:33:59.649359941 CET44550311109.68.15.1192.168.2.5
                                                                        Jan 15, 2025 16:33:59.649439096 CET50310445192.168.2.5109.68.15.138
                                                                        Jan 15, 2025 16:33:59.649437904 CET50311445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:33:59.649482012 CET50311445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:33:59.649735928 CET50312445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:33:59.654335022 CET44550311109.68.15.1192.168.2.5
                                                                        Jan 15, 2025 16:33:59.654401064 CET50311445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:33:59.654479027 CET44550312109.68.15.1192.168.2.5
                                                                        Jan 15, 2025 16:33:59.654541016 CET50312445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:33:59.654577971 CET50312445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:33:59.659353971 CET44550312109.68.15.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.276318073 CET4455012231.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.276405096 CET50122445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:34:00.276439905 CET50122445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:34:00.276485920 CET50122445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:34:00.281186104 CET4455012231.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.281202078 CET4455012231.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.405226946 CET50318445192.168.2.5155.203.74.163
                                                                        Jan 15, 2025 16:34:00.410008907 CET44550318155.203.74.163192.168.2.5
                                                                        Jan 15, 2025 16:34:00.410069942 CET50318445192.168.2.5155.203.74.163
                                                                        Jan 15, 2025 16:34:00.410111904 CET50318445192.168.2.5155.203.74.163
                                                                        Jan 15, 2025 16:34:00.410320044 CET50320445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:00.415082932 CET44550320155.203.74.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.415225029 CET50320445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:00.415225029 CET50320445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:00.415623903 CET44550318155.203.74.163192.168.2.5
                                                                        Jan 15, 2025 16:34:00.415635109 CET50321445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:00.416734934 CET44550318155.203.74.163192.168.2.5
                                                                        Jan 15, 2025 16:34:00.416788101 CET50318445192.168.2.5155.203.74.163
                                                                        Jan 15, 2025 16:34:00.420186043 CET44550320155.203.74.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.420238972 CET50320445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:00.420397043 CET44550321155.203.74.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.420478106 CET50321445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:00.420499086 CET50321445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:00.425226927 CET44550321155.203.74.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.498060942 CET4455012634.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.498181105 CET50126445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:34:00.498323917 CET50126445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:34:00.498390913 CET50126445192.168.2.534.235.99.1
                                                                        Jan 15, 2025 16:34:00.503083944 CET4455012634.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.503216028 CET4455012634.235.99.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.561208963 CET50323445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:00.565978050 CET4455032334.235.99.2192.168.2.5
                                                                        Jan 15, 2025 16:34:00.566067934 CET50323445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:00.566104889 CET50323445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:00.566457033 CET50324445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:00.571109056 CET4455032334.235.99.2192.168.2.5
                                                                        Jan 15, 2025 16:34:00.571191072 CET50323445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:00.571254969 CET4455032434.235.99.2192.168.2.5
                                                                        Jan 15, 2025 16:34:00.571326971 CET50324445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:00.571360111 CET50324445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:00.576097965 CET4455032434.235.99.2192.168.2.5
                                                                        Jan 15, 2025 16:34:00.873565912 CET50327445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:34:00.878401995 CET44550327117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:00.878483057 CET50327445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:34:00.878511906 CET50327445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:34:00.883338928 CET44550327117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:01.327153921 CET50332445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:34:01.332001925 CET4455033211.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:34:01.332097054 CET50332445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:34:01.332119942 CET50332445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:34:01.336961031 CET4455033211.35.30.1192.168.2.5
                                                                        Jan 15, 2025 16:34:02.297312975 CET4455013950.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:34:02.297472000 CET50139445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:34:02.297472000 CET50139445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:34:02.297521114 CET50139445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:34:02.302319050 CET4455013950.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:34:02.302328110 CET4455013950.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:34:02.495208979 CET44550142145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:34:02.495284081 CET50142445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:34:02.495400906 CET50142445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:34:02.495429993 CET50142445192.168.2.5145.33.46.1
                                                                        Jan 15, 2025 16:34:02.500242949 CET44550142145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:34:02.500257969 CET44550142145.33.46.1192.168.2.5
                                                                        Jan 15, 2025 16:34:02.561079979 CET50343445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:02.565884113 CET44550343145.33.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:02.565957069 CET50343445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:02.565972090 CET50343445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:02.566263914 CET50344445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:02.570918083 CET44550343145.33.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:02.570993900 CET50343445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:02.571067095 CET44550344145.33.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:02.571135044 CET50344445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:02.571187019 CET50344445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:02.575970888 CET44550344145.33.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:03.279901028 CET50352445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:34:03.284831047 CET4455035231.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:03.285619974 CET50352445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:34:03.285653114 CET50352445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:34:03.290431976 CET4455035231.119.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:03.959372997 CET44550327117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:03.959455967 CET50327445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:34:03.959541082 CET50327445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:34:03.959593058 CET50327445192.168.2.5117.209.18.1
                                                                        Jan 15, 2025 16:34:03.964417934 CET44550327117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:03.964437008 CET44550327117.209.18.1192.168.2.5
                                                                        Jan 15, 2025 16:34:04.014889956 CET50362445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:04.020404100 CET44550362117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:04.020534039 CET50362445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:04.020736933 CET50362445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:04.021305084 CET50363445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:04.025716066 CET44550362117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:04.025862932 CET50362445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:04.026132107 CET44550363117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:04.028650045 CET50363445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:04.028669119 CET50363445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:04.033535957 CET44550363117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:04.306763887 CET4455015617.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:34:04.306968927 CET50156445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:34:04.308506966 CET50156445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:34:04.308552027 CET50156445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:34:04.314798117 CET4455015617.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:34:04.314815998 CET4455015617.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:34:04.546859980 CET44550159176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:34:04.546968937 CET50159445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:34:04.547003984 CET50159445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:34:04.547041893 CET50159445192.168.2.5176.211.243.1
                                                                        Jan 15, 2025 16:34:04.551964998 CET44550159176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:34:04.551980972 CET44550159176.211.243.1192.168.2.5
                                                                        Jan 15, 2025 16:34:04.608063936 CET50371445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:04.613713980 CET44550371176.211.243.2192.168.2.5
                                                                        Jan 15, 2025 16:34:04.613831997 CET50371445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:04.613863945 CET50371445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:04.614308119 CET50372445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:04.619801998 CET44550372176.211.243.2192.168.2.5
                                                                        Jan 15, 2025 16:34:04.619904995 CET50372445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:04.619931936 CET50372445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:04.619961023 CET44550371176.211.243.2192.168.2.5
                                                                        Jan 15, 2025 16:34:04.620027065 CET50371445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:04.625972033 CET44550372176.211.243.2192.168.2.5
                                                                        Jan 15, 2025 16:34:05.311232090 CET50381445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:34:05.316195011 CET4455038150.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:34:05.316323996 CET50381445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:34:05.316415071 CET50381445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:34:05.321248055 CET4455038150.1.247.1192.168.2.5
                                                                        Jan 15, 2025 16:34:06.183909893 CET44550172120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:34:06.184012890 CET50172445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:34:06.184075117 CET50172445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:34:06.184143066 CET50172445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:34:06.189018011 CET44550172120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:34:06.189104080 CET44550172120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:34:06.572377920 CET44550174132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:34:06.572499990 CET50174445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:34:06.572499990 CET50174445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:34:06.572576046 CET50174445192.168.2.5132.245.46.1
                                                                        Jan 15, 2025 16:34:06.577419996 CET44550174132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:34:06.577436924 CET44550174132.245.46.1192.168.2.5
                                                                        Jan 15, 2025 16:34:06.641138077 CET50400445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:06.646146059 CET44550400132.245.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:06.646250963 CET50400445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:06.646279097 CET50400445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:06.646980047 CET50401445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:06.651345968 CET44550400132.245.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:06.651410103 CET50400445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:06.651820898 CET44550401132.245.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:06.651977062 CET50401445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:06.651977062 CET50401445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:06.658397913 CET44550401132.245.46.2192.168.2.5
                                                                        Jan 15, 2025 16:34:07.311090946 CET50411445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:34:07.316044092 CET4455041117.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:34:07.316286087 CET50411445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:34:07.316395044 CET50411445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:34:07.321166992 CET4455041117.237.114.1192.168.2.5
                                                                        Jan 15, 2025 16:34:07.963691950 CET44550186221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:34:07.963871956 CET50186445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:34:07.963912964 CET50186445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:34:07.963944912 CET50186445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:34:07.968713045 CET44550186221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:34:07.968739033 CET44550186221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:34:08.560544014 CET44550190181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:34:08.560729980 CET50190445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:34:08.560826063 CET50190445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:34:08.560874939 CET50190445192.168.2.5181.205.225.1
                                                                        Jan 15, 2025 16:34:08.566834927 CET44550190181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:34:08.566844940 CET44550190181.205.225.1192.168.2.5
                                                                        Jan 15, 2025 16:34:08.623687983 CET50436445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:08.629533052 CET44550436181.205.225.2192.168.2.5
                                                                        Jan 15, 2025 16:34:08.629663944 CET50436445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:08.629942894 CET50436445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:08.630333900 CET50437445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:08.634845972 CET44550436181.205.225.2192.168.2.5
                                                                        Jan 15, 2025 16:34:08.634915113 CET50436445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:08.635071039 CET44550437181.205.225.2192.168.2.5
                                                                        Jan 15, 2025 16:34:08.635132074 CET50437445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:08.635154963 CET50437445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:08.639899015 CET44550437181.205.225.2192.168.2.5
                                                                        Jan 15, 2025 16:34:09.006146908 CET44550363117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:09.006356955 CET50363445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:09.006448030 CET50363445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:09.006515026 CET50363445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:09.011200905 CET44550363117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:09.011279106 CET44550363117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:09.186055899 CET50451445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:34:09.191071033 CET44550451120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:34:09.191205978 CET50451445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:34:09.191256046 CET50451445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:34:09.196014881 CET44550451120.174.178.1192.168.2.5
                                                                        Jan 15, 2025 16:34:09.604015112 CET4455020048.162.219.1192.168.2.5
                                                                        Jan 15, 2025 16:34:09.604085922 CET50200445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:34:09.604125023 CET50200445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:34:09.604170084 CET50200445192.168.2.548.162.219.1
                                                                        Jan 15, 2025 16:34:09.608882904 CET4455020048.162.219.1192.168.2.5
                                                                        Jan 15, 2025 16:34:09.608935118 CET4455020048.162.219.1192.168.2.5
                                                                        Jan 15, 2025 16:34:10.541503906 CET44550207164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:34:10.541568041 CET50207445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:34:10.541605949 CET50207445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:34:10.541630030 CET50207445192.168.2.5164.70.86.1
                                                                        Jan 15, 2025 16:34:10.546432972 CET44550207164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:34:10.546442986 CET44550207164.70.86.1192.168.2.5
                                                                        Jan 15, 2025 16:34:10.592298985 CET50492445192.168.2.5164.70.86.2
                                                                        Jan 15, 2025 16:34:10.597096920 CET44550492164.70.86.2192.168.2.5
                                                                        Jan 15, 2025 16:34:10.597278118 CET50492445192.168.2.5164.70.86.2
                                                                        Jan 15, 2025 16:34:10.597278118 CET50492445192.168.2.5164.70.86.2
                                                                        Jan 15, 2025 16:34:10.597465038 CET50494445192.168.2.5164.70.86.2
                                                                        Jan 15, 2025 16:34:10.602298021 CET44550492164.70.86.2192.168.2.5
                                                                        Jan 15, 2025 16:34:10.602310896 CET44550494164.70.86.2192.168.2.5
                                                                        Jan 15, 2025 16:34:10.602363110 CET50492445192.168.2.5164.70.86.2
                                                                        Jan 15, 2025 16:34:10.602397919 CET50494445192.168.2.5164.70.86.2
                                                                        Jan 15, 2025 16:34:10.602437973 CET50494445192.168.2.5164.70.86.2
                                                                        Jan 15, 2025 16:34:10.607147932 CET44550494164.70.86.2192.168.2.5
                                                                        Jan 15, 2025 16:34:10.967358112 CET50512445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:34:10.972245932 CET44550512221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:34:10.972385883 CET50512445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:34:10.972616911 CET50512445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:34:10.977345943 CET44550512221.20.95.1192.168.2.5
                                                                        Jan 15, 2025 16:34:11.103861094 CET44550213181.135.148.1192.168.2.5
                                                                        Jan 15, 2025 16:34:11.103960037 CET50213445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:34:11.104000092 CET50213445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:34:11.104048014 CET50213445192.168.2.5181.135.148.1
                                                                        Jan 15, 2025 16:34:11.108809948 CET44550213181.135.148.1192.168.2.5
                                                                        Jan 15, 2025 16:34:11.108865023 CET44550213181.135.148.1192.168.2.5
                                                                        Jan 15, 2025 16:34:12.014422894 CET50606445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:12.019335985 CET44550606117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:12.019424915 CET50606445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:12.019464016 CET50606445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:12.024239063 CET44550606117.209.18.2192.168.2.5
                                                                        Jan 15, 2025 16:34:12.578218937 CET44550225184.93.96.1192.168.2.5
                                                                        Jan 15, 2025 16:34:12.578282118 CET50225445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:34:12.603753090 CET44550227126.201.173.1192.168.2.5
                                                                        Jan 15, 2025 16:34:12.603809118 CET50227445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:34:13.377928972 CET50257445192.168.2.5210.39.38.2
                                                                        Jan 15, 2025 16:34:13.377973080 CET50227445192.168.2.5126.201.173.1
                                                                        Jan 15, 2025 16:34:13.378031969 CET50401445192.168.2.5132.245.46.2
                                                                        Jan 15, 2025 16:34:13.378083944 CET50324445192.168.2.534.235.99.2
                                                                        Jan 15, 2025 16:34:13.378094912 CET50332445192.168.2.511.35.30.1
                                                                        Jan 15, 2025 16:34:13.378119946 CET50352445192.168.2.531.119.18.1
                                                                        Jan 15, 2025 16:34:13.378158092 CET50284445192.168.2.528.236.197.1
                                                                        Jan 15, 2025 16:34:13.378180027 CET50372445192.168.2.5176.211.243.2
                                                                        Jan 15, 2025 16:34:13.378210068 CET50278445192.168.2.574.0.230.2
                                                                        Jan 15, 2025 16:34:13.378242970 CET50344445192.168.2.5145.33.46.2
                                                                        Jan 15, 2025 16:34:13.378278017 CET50225445192.168.2.5184.93.96.1
                                                                        Jan 15, 2025 16:34:13.378304958 CET50273445192.168.2.514.116.193.1
                                                                        Jan 15, 2025 16:34:13.378333092 CET50266445192.168.2.569.147.41.1
                                                                        Jan 15, 2025 16:34:13.378427982 CET50298445192.168.2.515.163.145.2
                                                                        Jan 15, 2025 16:34:13.378448963 CET50411445192.168.2.517.237.114.1
                                                                        Jan 15, 2025 16:34:13.378505945 CET50237445192.168.2.5187.171.233.1
                                                                        Jan 15, 2025 16:34:13.378597975 CET50250445192.168.2.559.14.88.1
                                                                        Jan 15, 2025 16:34:13.378647089 CET50243445192.168.2.535.88.223.1
                                                                        Jan 15, 2025 16:34:13.378647089 CET50286445192.168.2.5180.67.167.1
                                                                        Jan 15, 2025 16:34:13.378671885 CET50292445192.168.2.5104.211.2.1
                                                                        Jan 15, 2025 16:34:13.378746986 CET50303445192.168.2.510.93.250.1
                                                                        Jan 15, 2025 16:34:13.378777981 CET50306445192.168.2.599.122.129.1
                                                                        Jan 15, 2025 16:34:13.378777981 CET50312445192.168.2.5109.68.15.1
                                                                        Jan 15, 2025 16:34:13.378889084 CET50437445192.168.2.5181.205.225.2
                                                                        Jan 15, 2025 16:34:13.378906965 CET50512445192.168.2.5221.20.95.1
                                                                        Jan 15, 2025 16:34:13.378937960 CET50451445192.168.2.5120.174.178.1
                                                                        Jan 15, 2025 16:34:13.378947020 CET50321445192.168.2.5155.203.74.1
                                                                        Jan 15, 2025 16:34:13.378947020 CET50381445192.168.2.550.1.247.1
                                                                        Jan 15, 2025 16:34:13.379004002 CET50606445192.168.2.5117.209.18.2
                                                                        Jan 15, 2025 16:34:13.379120111 CET50494445192.168.2.5164.70.86.2
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 15, 2025 16:33:07.401679993 CET5983753192.168.2.51.1.1.1
                                                                        Jan 15, 2025 16:33:07.412075043 CET53598371.1.1.1192.168.2.5
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Jan 15, 2025 16:33:07.401679993 CET192.168.2.51.1.1.10x2600Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Jan 15, 2025 16:33:07.412075043 CET1.1.1.1192.168.2.50x2600No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                                                        Jan 15, 2025 16:33:07.412075043 CET1.1.1.1192.168.2.50x2600No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                                                        • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.549704104.16.166.228806004C:\Windows\mssecsvc.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Jan 15, 2025 16:33:07.424813986 CET100OUTGET / HTTP/1.1
                                                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                        Cache-Control: no-cache
                                                                        Jan 15, 2025 16:33:07.947545052 CET778INHTTP/1.1 200 OK
                                                                        Date: Wed, 15 Jan 2025 15:33:07 GMT
                                                                        Content-Type: text/html
                                                                        Content-Length: 607
                                                                        Connection: close
                                                                        Server: cloudflare
                                                                        CF-RAY: 9026ec240f930f8b-EWR
                                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        1192.168.2.549705104.16.166.228805652C:\Windows\mssecsvc.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Jan 15, 2025 16:33:08.110788107 CET100OUTGET / HTTP/1.1
                                                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                        Cache-Control: no-cache
                                                                        Jan 15, 2025 16:33:08.620934963 CET778INHTTP/1.1 200 OK
                                                                        Date: Wed, 15 Jan 2025 15:33:08 GMT
                                                                        Content-Type: text/html
                                                                        Content-Length: 607
                                                                        Connection: close
                                                                        Server: cloudflare
                                                                        CF-RAY: 9026ec285c9ef5fa-EWR
                                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        2192.168.2.549729104.16.166.228804708C:\Windows\mssecsvc.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Jan 15, 2025 16:33:10.257705927 CET100OUTGET / HTTP/1.1
                                                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                        Cache-Control: no-cache
                                                                        Jan 15, 2025 16:33:10.745541096 CET778INHTTP/1.1 200 OK
                                                                        Date: Wed, 15 Jan 2025 15:33:10 GMT
                                                                        Content-Type: text/html
                                                                        Content-Length: 607
                                                                        Connection: close
                                                                        Server: cloudflare
                                                                        CF-RAY: 9026ec35b9cac44f-EWR
                                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:10:33:05
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\System32\loaddll32.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:loaddll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll"
                                                                        Imagebase:0x100000
                                                                        File size:126'464 bytes
                                                                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:10:33:05
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff6d64d0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:10:33:05
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1
                                                                        Imagebase:0x790000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:10:33:05
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:rundll32.exe C:\Users\user\Desktop\JRTn7b1kHg.dll,PlayGame
                                                                        Imagebase:0x3b0000
                                                                        File size:61'440 bytes
                                                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:4
                                                                        Start time:10:33:05
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",#1
                                                                        Imagebase:0x3b0000
                                                                        File size:61'440 bytes
                                                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:10:33:05
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\mssecsvc.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                                                        Imagebase:0x400000
                                                                        File size:3'723'264 bytes
                                                                        MD5 hash:20824BFA05275A0452726AAFBFE0B044
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2065324011.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2082281860.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2065485927.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.2065485927.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:7
                                                                        Start time:10:33:06
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\mssecsvc.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                                                        Imagebase:0x400000
                                                                        File size:3'723'264 bytes
                                                                        MD5 hash:20824BFA05275A0452726AAFBFE0B044
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2073470973.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2716134237.0000000001EB8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2716134237.0000000001EB8000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2073588217.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.2073588217.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2716998519.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2716998519.00000000023E7000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:8
                                                                        Start time:10:33:07
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\tasksche.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                                                        Imagebase:0x400000
                                                                        File size:3'514'368 bytes
                                                                        MD5 hash:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2080935936.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                                                        Antivirus matches:
                                                                        • Detection: 100%, Avira
                                                                        • Detection: 100%, Joe Sandbox ML
                                                                        • Detection: 100%, ReversingLabs
                                                                        • Detection: 90%, Virustotal, Browse
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Target ID:9
                                                                        Start time:10:33:08
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\JRTn7b1kHg.dll",PlayGame
                                                                        Imagebase:0x3b0000
                                                                        File size:61'440 bytes
                                                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:10
                                                                        Start time:10:33:08
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\mssecsvc.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                                                        Imagebase:0x400000
                                                                        File size:3'723'264 bytes
                                                                        MD5 hash:20824BFA05275A0452726AAFBFE0B044
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2102681023.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2094368846.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2102811710.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.2102811710.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2094509627.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.2094509627.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:11
                                                                        Start time:10:33:09
                                                                        Start date:15/01/2025
                                                                        Path:C:\Windows\tasksche.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                                                        Imagebase:0x400000
                                                                        File size:3'514'368 bytes
                                                                        MD5 hash:7F7CCAA16FB15EB1C7399D422F8363E8
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.2102253812.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.2101816920.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:71.7%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:63.2%
                                                                          Total number of Nodes:38
                                                                          Total number of Limit Nodes:9
                                                                          execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                                                          Callgraph

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                                          • sprintf.MSVCRT ref: 00407E01
                                                                          • sprintf.MSVCRT ref: 00407E18
                                                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                                          • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                                          • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                                          • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                                          • CreateProcessA.KERNELBASE ref: 00407EE8
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                                          • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2082242309.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000005.00000002.2082207770.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082260984.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082339155.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                                          • API String ID: 4281112323-1507730452
                                                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2082242309.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000005.00000002.2082207770.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082260984.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082339155.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                          • String ID:
                                                                          • API String ID: 801014965-0
                                                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                                          Strings
                                                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2082242309.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000005.00000002.2082207770.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082260984.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082339155.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Internet$CloseHandleOpen
                                                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                          • API String ID: 435140893-2942426231
                                                                          • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                                          • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                                                          • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                                          • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • sprintf.MSVCRT ref: 00407C56
                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2082242309.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000005.00000002.2082207770.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082260984.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082339155.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                                          • API String ID: 3340711343-4063779371
                                                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                          • __p___argc.MSVCRT ref: 004080A5
                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2082242309.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000005.00000002.2082207770.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082260984.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082281860.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082339155.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2082448391.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                                          • String ID: mssecsvc2.0
                                                                          • API String ID: 4274534310-3729025388
                                                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                                          Execution Graph

                                                                          Execution Coverage:34.8%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:36
                                                                          Total number of Limit Nodes:2

                                                                          Callgraph

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                          • __p___argc.MSVCRT ref: 004080A5
                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.2714907811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000007.00000002.2714888643.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714930920.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715017184.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715037556.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                                          • String ID: mssecsvc2.0
                                                                          • API String ID: 4274534310-3729025388
                                                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                                          Strings
                                                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.2714907811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000007.00000002.2714888643.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714930920.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715017184.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715037556.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Internet$CloseHandleOpen
                                                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                                                          • API String ID: 435140893-2942426231
                                                                          • Opcode ID: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                                          • Instruction ID: 1dd4d323c29996ceece3d10fb5d3e331cb9ed4e1cabd62d72b2cd6c3d10c6962
                                                                          • Opcode Fuzzy Hash: 7bc602e844cdf910e4a24fc0389d75e4e4c0db4e5e0cdfe1b8e612c3f784a296
                                                                          • Instruction Fuzzy Hash: 050162715443106EE320DF648D01B6B7BE9EF85710F01082EF984E7280EAB59804876B

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • sprintf.MSVCRT ref: 00407C56
                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.2714907811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000007.00000002.2714888643.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714930920.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715017184.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715037556.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                                                          • API String ID: 3340711343-4063779371
                                                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                                          • sprintf.MSVCRT ref: 00407E01
                                                                          • sprintf.MSVCRT ref: 00407E18
                                                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.2714907811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000007.00000002.2714888643.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714930920.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715017184.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715037556.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                                          • API String ID: 4072214828-1507730452
                                                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000007.00000002.2714907811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000007.00000002.2714888643.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714930920.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714950705.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2714997778.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715017184.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715037556.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 00000007.00000002.2715132506.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_7_2_400000_mssecsvc.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                          • String ID:
                                                                          • API String ID: 801014965-0
                                                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                                                          APIs
                                                                          • memcpy.MSVCRT(000000FF,?,0000012C,?,00000000), ref: 00406C91
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: memcpy
                                                                          • String ID: /../$/..\$\../$\..\
                                                                          • API String ID: 3510742995-3885502717
                                                                          • Opcode ID: 00491be41aa5427f31b8b9a32a9b57da7e2e6dff5cb5143b376a5dd6570fe62a
                                                                          • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                                                          • Opcode Fuzzy Hash: 00491be41aa5427f31b8b9a32a9b57da7e2e6dff5cb5143b376a5dd6570fe62a
                                                                          • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                                                          APIs
                                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                                          • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                                          • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                                          • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                                          • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                                          • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                                          • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoad
                                                                          • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                                                          • API String ID: 2238633743-2459060434
                                                                          • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                                          • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                                                          • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                                                          • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                                                          APIs
                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                                                          • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Service$CloseHandleOpen$ManagerStart
                                                                          • String ID: cmd.exe /c "%s"
                                                                          • API String ID: 1485051382-955883872
                                                                          • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                                          • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                                                          • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                                                          • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                                                          APIs
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                                                          • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??0exception@@ExceptionThrow$memcpy
                                                                          • String ID:
                                                                          • API String ID: 1881450474-3916222277
                                                                          • Opcode ID: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                                                          • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                                                          • Opcode Fuzzy Hash: 5e29447d29244d2d39637b6b268b84fba844d2984039595502739967419f177d
                                                                          • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                                                          • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                                                          • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                                                          • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                                                          • String ID: 2!@$WANACRY!
                                                                          • API String ID: 283026544-2846199637
                                                                          • Opcode ID: 132a2296b2ff258622cfdc5610791c464188c2d7d3f69318739cc377377d902c
                                                                          • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                                                          • Opcode Fuzzy Hash: 132a2296b2ff258622cfdc5610791c464188c2d7d3f69318739cc377377d902c
                                                                          • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                                                          • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                                                          • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                                                          • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                                                          • String ID: 2!@$WANACRY!
                                                                          • API String ID: 283026544-2846199637
                                                                          • Opcode ID: d9b1b6046084e2d9d8768fc4d8ac5865fa55d0fd0db9d64480dfd0594076ccd5
                                                                          • Instruction ID: 4f5db7b03fbae4bd1a74ba09c9783dfc14942441ffc150fb06ee42d3f2d97cbc
                                                                          • Opcode Fuzzy Hash: d9b1b6046084e2d9d8768fc4d8ac5865fa55d0fd0db9d64480dfd0594076ccd5
                                                                          • Instruction Fuzzy Hash: EF511C71901219AFDB219F95CD88BEEB7BCEB08380F1444BAF515F61A0D7399A45CF28
                                                                          APIs
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                                                          • String ID: $Q;@
                                                                          • API String ID: 2382887404-262343263
                                                                          • Opcode ID: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                                                          • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                                                          • Opcode Fuzzy Hash: 9d88d7451ce12b7c3a5d5664735e91029da3423811efce9d06213ba3f138044b
                                                                          • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                                                          APIs
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                                                          • String ID:
                                                                          • API String ID: 2382887404-3916222277
                                                                          • Opcode ID: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                                                          • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                                                          • Opcode Fuzzy Hash: 42e34b84d78c9f38c94d52d8705d7c54678ed6dfd70add5debdb3b39e4a64336
                                                                          • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                                                          APIs
                                                                          • free.MSVCRT(?,?,00000000,00000000,0040243C,00000000), ref: 00402A15
                                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                                                          • HeapFree.KERNEL32(00000000), ref: 00402A3D
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Heap$FreeProcessfree
                                                                          • String ID:
                                                                          • API String ID: 3428986607-0
                                                                          • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                                          • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                                                          • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                                                          • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                                                          APIs
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??0exception@@ExceptionThrow
                                                                          • String ID:
                                                                          • API String ID: 941485209-0
                                                                          • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                                          • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                                                          • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                                                          • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                                                          APIs
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??0exception@@ExceptionThrow
                                                                          • String ID:
                                                                          • API String ID: 941485209-0
                                                                          • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                                          • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                                                          • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                                                          • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: memcpy
                                                                          • String ID:
                                                                          • API String ID: 3510742995-0
                                                                          • Opcode ID: 71b96a770fe0ecad1357f1a23098f25de26b1f41743f28900a51c64cf9a44166
                                                                          • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                                                          • Opcode Fuzzy Hash: 71b96a770fe0ecad1357f1a23098f25de26b1f41743f28900a51c64cf9a44166
                                                                          • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                                                          APIs
                                                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ContextCryptRelease
                                                                          • String ID:
                                                                          • API String ID: 829835001-0
                                                                          • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                                          • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                                                          • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                                                          • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                                          • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                                                          • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                                                          • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                                          • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                                                          • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                                                          • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                                                          APIs
                                                                            • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                                                          • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                                                          • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                                                          • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                                                          • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                                                          • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoad
                                                                          • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                                                          • API String ID: 2238633743-1294736154
                                                                          • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                                          • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                                                          • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                                                          • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                                                          APIs
                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000208), ref: 0040201F
                                                                            • Part of subcall function 00401225: GetComputerNameW.KERNEL32(?,0000018F), ref: 0040125F
                                                                            • Part of subcall function 00401225: wcslen.MSVCRT(?), ref: 00401279
                                                                            • Part of subcall function 00401225: wcslen.MSVCRT(?), ref: 00401298
                                                                            • Part of subcall function 00401225: srand.MSVCRT(00000001), ref: 004012A1
                                                                            • Part of subcall function 00401225: rand.MSVCRT ref: 004012AE
                                                                            • Part of subcall function 00401225: rand.MSVCRT ref: 004012C0
                                                                            • Part of subcall function 00401225: rand.MSVCRT ref: 004012DD
                                                                          • __p___argc.MSVCRT ref: 00402030
                                                                          • __p___argv.MSVCRT(0040F538), ref: 00402040
                                                                          • strcmp.MSVCRT(?), ref: 0040204B
                                                                            • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                                            • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                                            • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                                            • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                                          • CopyFileA.KERNEL32(?,tasksche.exe,00000000), ref: 0040206F
                                                                          • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                                                            • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                                                          • strrchr.MSVCRT(?,0000005C), ref: 0040209D
                                                                          • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                                                          • SetCurrentDirectoryA.KERNEL32(?), ref: 004020BB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$Namerand$AttributesDirectorystrrchrwcslen$ByteCharComputerCopyCurrentFullModuleMultiPathWideWindows__p___argc__p___argvsrandstrcmpswprintf
                                                                          • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                                                          • API String ID: 1102508541-2844324180
                                                                          • Opcode ID: fa07170e1e4a4f1b7f83228e29d312703e7eca5b79990a058ae1880847bcfca1
                                                                          • Instruction ID: 97633fc0405850e3ba211803acf8e340ff081048f6dba40907e2b9e4b27fb4f3
                                                                          • Opcode Fuzzy Hash: fa07170e1e4a4f1b7f83228e29d312703e7eca5b79990a058ae1880847bcfca1
                                                                          • Instruction Fuzzy Hash: 3741B472500359AEDB20A7B1DE49E9F376C9F10314F2005BFF645F61E2DE788D488A28
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: %s%s$%s%s%s$:$\
                                                                          • API String ID: 0-1100577047
                                                                          • Opcode ID: 4cc63effac65e5938d24d15cc637f4576a4bae754db62ced997f6066a9556017
                                                                          • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                                                          • Opcode Fuzzy Hash: 4cc63effac65e5938d24d15cc637f4576a4bae754db62ced997f6066a9556017
                                                                          • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                                                          APIs
                                                                          • wcscat.MSVCRT(?,WanaCrypt0r), ref: 0040114B
                                                                          • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                                                          • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                                                          • strlen.MSVCRT(?), ref: 004011A7
                                                                          • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                                                          • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                                                          • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                                                          • String ID: 0@$Software\$WanaCrypt0r
                                                                          • API String ID: 865909632-3421300005
                                                                          • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                                          • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                                                          • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                                                          • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                                                          • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                                                          • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                                                          • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                                                          • String ID: %s\Intel$%s\ProgramData
                                                                          • API String ID: 3806094219-198707228
                                                                          • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                                          • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                                                          • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                                                          • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                                                          APIs
                                                                          • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                                                          • __p__fmode.MSVCRT ref: 004077FC
                                                                          • __p__commode.MSVCRT ref: 0040780A
                                                                          • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                                                          • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                                                          • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                                                          • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                                                          • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                                                          • exit.MSVCRT(00000000), ref: 004078F2
                                                                          • _XcptFilter.MSVCRT(?,?), ref: 00407904
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                          • String ID:
                                                                          • API String ID: 801014965-0
                                                                          • Opcode ID: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                                                          • Instruction ID: b6807de3fe1c3e28ab0f2b8c021909998ac3013dced3884fb388c7f537fcd598
                                                                          • Opcode Fuzzy Hash: 0e2500766ef754de96a0bec646d21198ba904cb2609c2db2b7504f8e1e7d9631
                                                                          • Instruction Fuzzy Hash: A34173B1C04344AFDB20AFA4DE49AA97BB8BF05310F20417FE581B72E1D7786845CB59
                                                                          APIs
                                                                            • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?,00000040,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402463
                                                                          • SetLastError.KERNEL32(000000C1,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402219
                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,00000000,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000,?,t.wnry), ref: 00402291
                                                                          • GetProcessHeap.KERNEL32(00000008,0000003C), ref: 00402313
                                                                          • HeapAlloc.KERNEL32(00000000), ref: 0040231A
                                                                          • memcpy.MSVCRT(00000000,?,?), ref: 004023A7
                                                                            • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?,?,00000000,00000000,?), ref: 004024D5
                                                                          • SetLastError.KERNEL32(0000045A), ref: 00402430
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                                          • API String ID: 1900561814-192647395
                                                                          • Opcode ID: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                                                          • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                                                          • Opcode Fuzzy Hash: 3b06903ad61f6388da72c89ae901831d64978f6829295481817f3ae41c17b4c7
                                                                          • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                                                          APIs
                                                                          • FindResourceA.KERNEL32(?,0000080A,XIA), ref: 00401DC3
                                                                          • LoadResource.KERNEL32(?,00000000), ref: 00401DD3
                                                                          • LockResource.KERNEL32(00000000), ref: 00401DDE
                                                                          • SizeofResource.KERNEL32(?,00000000,?), ref: 00401DF1
                                                                          • strcmp.MSVCRT(?,c.wnry,00000000,00000000,00000000), ref: 00401E5B
                                                                          • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Resource$AttributesFileFindLoadLockSizeofstrcmp
                                                                          • String ID: XIA$c.wnry
                                                                          • API String ID: 1616299030-2505933848
                                                                          • Opcode ID: fa50258f105623fefeb72ee45be684de9f148c77f4537fdf01ad18e8f360a7dc
                                                                          • Instruction ID: c6e87d2598776ad3e20a4276f2cf7508875c12884426eb96d7428c940f8e6225
                                                                          • Opcode Fuzzy Hash: fa50258f105623fefeb72ee45be684de9f148c77f4537fdf01ad18e8f360a7dc
                                                                          • Instruction Fuzzy Hash: 93210332D001147ADB216631DC45FEF3A6C9F45360F1001B6FE48F21D1DB38DA998AE9
                                                                          APIs
                                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                                                          • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                                                          • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                                                          • String ID: %s\%s
                                                                          • API String ID: 1036847564-4073750446
                                                                          • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                                          • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                                                          • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                                                          • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                                                          • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                                                          • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                                                          • CloseHandle.KERNEL32(?), ref: 004010EC
                                                                          • CloseHandle.KERNEL32(?), ref: 004010F1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                                                          • String ID: D
                                                                          • API String ID: 786732093-2746444292
                                                                          • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                                          • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                                                          • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                                                          • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: rand$wcslen$ComputerNamesrand
                                                                          • String ID:
                                                                          • API String ID: 3058258771-0
                                                                          • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                                          • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                                                          • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                                                          • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                                                          APIs
                                                                          • GetFileAttributesA.KERNEL32(00000000,00000000,00000000), ref: 00407083
                                                                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00407091
                                                                          • memcpy.MSVCRT(?,004073A3,004073A3,?,00000000,00000000), ref: 004070CA
                                                                          • strcpy.MSVCRT(00000000,00000000,00000000,00000000), ref: 004070FB
                                                                          • strcat.MSVCRT(00000000,004073A3,00000000,00000000), ref: 0040710A
                                                                          • GetFileAttributesA.KERNEL32(00000000,00000000,00000000), ref: 00407118
                                                                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                                                          • String ID:
                                                                          • API String ID: 2935503933-0
                                                                          • Opcode ID: c1a765a30f049a6e983e84c7fcdc04c319bd997b8f8109f685edbec73173bf57
                                                                          • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                                                          • Opcode Fuzzy Hash: c1a765a30f049a6e983e84c7fcdc04c319bd997b8f8109f685edbec73173bf57
                                                                          • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                                                          APIs
                                                                          • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                                                          • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                                                          • Sleep.KERNEL32(000003E8), ref: 00401F40
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CloseHandleMutexOpenSleepsprintf
                                                                          • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                                                          • API String ID: 2780352083-2959021817
                                                                          • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                                          • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                                                          • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                                                          • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                                                          APIs
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                                                          • String ID:
                                                                          • API String ID: 2382887404-0
                                                                          • Opcode ID: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                                                          • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                                                          • Opcode Fuzzy Hash: 7d0f093dcb85c1b01e904b58e66d92adf2767ba9b2af66087918d42cfe2af866
                                                                          • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                                                          APIs
                                                                          • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                                                          • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                                                          • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                                                          • fclose.MSVCRT(00000000), ref: 00401058
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: fclosefopenfreadfwrite
                                                                          • String ID: c.wnry
                                                                          • API String ID: 4000964834-3240288721
                                                                          • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                                          • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                                                          • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                                                          • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                                                          APIs
                                                                          • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?,004023F5,00000000), ref: 00402812
                                                                          • realloc.MSVCRT(85000001,317459C0,00000000), ref: 00402854
                                                                          • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Read$realloc
                                                                          • String ID:
                                                                          • API String ID: 1241503663-0
                                                                          • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                                          • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                                                          • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                                                          • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040193A
                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040194A
                                                                          • GlobalAlloc.KERNEL32(00000000,00000000), ref: 00401964
                                                                          • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000), ref: 0040197D
                                                                          • _local_unwind2.MSVCRT(?,000000FF), ref: 004019A6
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                                                          • String ID:
                                                                          • API String ID: 2811923685-0
                                                                          • Opcode ID: 3fa06aadd2471a705e8128430a745042bdb722af5d61b5b79dd264e81bcff4b6
                                                                          • Instruction ID: 6e643f249040116b9fc09fba66d69f614d66e1f70caffd77d95453aa30823522
                                                                          • Opcode Fuzzy Hash: 3fa06aadd2471a705e8128430a745042bdb722af5d61b5b79dd264e81bcff4b6
                                                                          • Instruction Fuzzy Hash: B1216DB1905224AFCB219BA59D48BDF7E78EB097A0F14422BF415B22E0D7384845C7AC
                                                                          APIs
                                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,00000140,?,00406C12,?,00000000,00000001), ref: 00405BFE
                                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?), ref: 00405C29
                                                                          • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA,?,?,?), ref: 00405C38
                                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,?,00000000,?,00000140,?,00406C12,?,00000000,00000001,?,004074EA), ref: 00405C8A
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$Pointer$??2@Create
                                                                          • String ID:
                                                                          • API String ID: 1331958074-0
                                                                          • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                                          • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                                                          • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                                                          • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                                                          APIs
                                                                          • GetCurrentDirectoryA.KERNEL32(00000104,00000140,00000000,00000000,00000000,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003), ref: 00406BB5
                                                                          • strlen.MSVCRT(00000140,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 00406BBC
                                                                          • strcat.MSVCRT(00000140,0040F818,?,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000), ref: 00406BD7
                                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,004074EA,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00406BEE
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CurrentDirectoryFilePointerstrcatstrlen
                                                                          • String ID:
                                                                          • API String ID: 1952800545-0
                                                                          • Opcode ID: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                                                          • Instruction ID: 093f70e5e45cef0a0e83344fd40667ee43cd8b667dee5f3d4d1a5a93074d9648
                                                                          • Opcode Fuzzy Hash: f23f8598dec8bbb4ac10b6a236faff338d1a89892e54ee5ab5b1cbc5c19062ee
                                                                          • Instruction Fuzzy Hash: 06112372004218AAFB305B28DD01BAB3368EB21720F21013FF592B91D0E778A9A2975D
                                                                          APIs
                                                                          • __EH_prolog.LIBCMT ref: 004074A9
                                                                          • ??2@YAPAXI@Z.MSVCRT(00000244,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074B5
                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 004074FF
                                                                            • Part of subcall function 00407527: strlen.MSVCRT(00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 0040754F
                                                                            • Part of subcall function 00407527: ??2@YAPAXI@Z.MSVCRT(00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 00407556
                                                                            • Part of subcall function 00407527: strcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,00000000,004074D0,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE), ref: 00407563
                                                                          • ??2@YAPAXI@Z.MSVCRT(00000008,?,?,?,00000000,?,004075C0,00000000,00000000,00000003,00000000,00401DFE,00000000,00000000), ref: 0040750B
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??2@$??3@H_prologstrcpystrlen
                                                                          • String ID:
                                                                          • API String ID: 1367312548-0
                                                                          • Opcode ID: a4ccc6bdab315bb6810547fd1e784a1e5bd6969783f5aead57b9b326a8da6d2d
                                                                          • Instruction ID: 24e2e141a7415e54cfde60e06bc6f84240982ef19f6b767edb42695c1fbc6ce5
                                                                          • Opcode Fuzzy Hash: a4ccc6bdab315bb6810547fd1e784a1e5bd6969783f5aead57b9b326a8da6d2d
                                                                          • Instruction Fuzzy Hash: C101D431D09111BBDB166F659C02B9E3EA0AF04764F10853FF806B76D1DB78AD00C69E
                                                                          APIs
                                                                          • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000), ref: 00405CB6
                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000), ref: 00405CBD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ??3@CloseHandle
                                                                          • String ID: $l@
                                                                          • API String ID: 3816424416-2140230165
                                                                          • Opcode ID: 695026124e8f63dae5928df1cfc53220c2aa5689ade8ebf819959d8fbb63d2b2
                                                                          • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                                                          • Opcode Fuzzy Hash: 695026124e8f63dae5928df1cfc53220c2aa5689ade8ebf819959d8fbb63d2b2
                                                                          • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                                                          APIs
                                                                          • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                                                          • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2081394726.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000008.00000002.2081365558.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081416742.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081470323.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                          • Associated: 00000008.00000002.2081567339.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_400000_tasksche.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CriticalSection$Leave$Entermemcpy
                                                                          • String ID:
                                                                          • API String ID: 3435569088-0
                                                                          • Opcode ID: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                                                          • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                                                          • Opcode Fuzzy Hash: 94e8d9869d495fd689c19527cd0e18adf9874140e5f97769a3eef967b1068a4f
                                                                          • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65