Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ET6LdJaK54.dll

Overview

General Information

Sample name:ET6LdJaK54.dll
renamed because original name is a hash value
Original sample name:ef894d1c6dd120fad5a885bc737d6338.dll
Analysis ID:1592053
MD5:ef894d1c6dd120fad5a885bc737d6338
SHA1:5a0b060469b3d9a0ae8b46969e5a92cf7cbcb909
SHA256:7f45d112de4bb9aec75ce9e2f22997d10d383fc82c357d1c1f97ea5a10132663
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7460 cmdline: loaddll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7512 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7536 cmdline: rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7560 cmdline: C:\WINDOWS\mssecsvc.exe MD5: F94040A4F1B7430DA9CB70BFA8B8B4D9)
          • tasksche.exe (PID: 7676 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 9CACE6E7D4EA5A7A5EC8F43B950B6A94)
    • rundll32.exe (PID: 7520 cmdline: rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7772 cmdline: rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7792 cmdline: C:\WINDOWS\mssecsvc.exe MD5: F94040A4F1B7430DA9CB70BFA8B8B4D9)
        • tasksche.exe (PID: 7880 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 9CACE6E7D4EA5A7A5EC8F43B950B6A94)
  • mssecsvc.exe (PID: 7604 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: F94040A4F1B7430DA9CB70BFA8B8B4D9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ET6LdJaK54.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    ET6LdJaK54.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    ET6LdJaK54.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000005.00000000.1686586617.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        0000000A.00000002.1728045556.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          6.2.mssecsvc.exe.239b8c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          6.2.mssecsvc.exe.1e69084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          6.0.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            6.0.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0xf4d8:$x3: tasksche.exe
            • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0xf52c:$x5: WNcry@2ol7
            • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0xf42c:$s3: cmd.exe /c "%s"
            • 0x41980:$s4: msg/m_portuguese.wnry
            • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            6.0.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 135 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.519492+010020315153Misc activity104.16.167.22880192.168.2.449730TCP
            2025-01-15T17:50:02.252214+010020315153Misc activity104.16.167.22880192.168.2.449731TCP
            2025-01-15T17:50:04.845918+010020315153Misc activity104.16.167.22880192.168.2.449750TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.018671+010020242911A Network Trojan was detected192.168.2.4562611.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020242981A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020242981A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020242981A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020242991A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020242991A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020242991A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020243011A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020243011A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020243011A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020243021A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020243021A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020243021A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010028033043Unknown Traffic192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010028033043Unknown Traffic192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010028033043Unknown Traffic192.168.2.449750104.16.167.22880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ET6LdJaK54.dllAvira: detected
            Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 97%
            Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
            Source: ET6LdJaK54.dllReversingLabs: Detection: 94%
            Source: ET6LdJaK54.dllVirustotal: Detection: 93%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability
            Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
            Source: ET6LdJaK54.dllJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

            Exploits

            barindex
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: ET6LdJaK54.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: Binary string: ole32.pdbdCompareExchange64 source: ET6LdJaK54.dll, tasksche.exe.5.dr
            Source: Binary string: ole32.pdb source: ET6LdJaK54.dll, tasksche.exe.5.dr

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:01 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275cc70a8232d9-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:02 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275ccb9d690f71-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:04 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275cd89dd17c94-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:04 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275cd89dd17c94-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: unknownNetwork traffic detected: IP country count 10
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.4:56261 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49731
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49750
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49730
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.1
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: ET6LdJaK54.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: mssecsvc.exe, 00000005.00000002.1713856474.0000000000D70000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
            Source: mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/(3
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/L
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/YCN
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9B
            Source: mssecsvc.exe, 00000006.00000002.2341094885.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comiA
            Source: mssecsvc.exe, 00000009.00000002.1729269917.0000000000B04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
            Source: Yara matchFile source: ET6LdJaK54.dll, type: SAMPLE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000000.1686586617.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1728446272.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1694602947.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1714967200.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7560, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7604, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7792, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

            System Summary

            barindex
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.239b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e69084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000002.1728045556.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000000.1703594047.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
            Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
            Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
            Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
            Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
            Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
            Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
            Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
            Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
            Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
            Source: ET6LdJaK54.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.239b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e69084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000002.1728045556.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000000.1703594047.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: tasksche.exe, 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmp, ET6LdJaK54.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
            Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
            Source: ET6LdJaK54.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGame
            Source: ET6LdJaK54.dllReversingLabs: Detection: 94%
            Source: ET6LdJaK54.dllVirustotal: Detection: 93%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGame
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",PlayGame
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGameJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",PlayGameJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: ET6LdJaK54.dllStatic file information: File size 5267459 > 1048576
            Source: ET6LdJaK54.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
            Source: Binary string: ole32.pdbdCompareExchange64 source: ET6LdJaK54.dll, tasksche.exe.5.dr
            Source: Binary string: ole32.pdb source: ET6LdJaK54.dll, tasksche.exe.5.dr
            Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
            Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7648Thread sleep count: 90 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7648Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7652Thread sleep count: 126 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7652Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7648Thread sleep time: -86400000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: mssecsvc.exe, 00000005.00000002.1713856474.0000000000D45000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
            Source: mssecsvc.exe, 00000006.00000003.1701575704.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW\
            Source: mssecsvc.exe, 00000005.00000002.1713856474.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000003.1701575704.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1Jump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Service Execution
            4
            Windows Service
            4
            Windows Service
            12
            Masquerading
            OS Credential Dumping1
            Network Share Discovery
            Remote Services1
            Archive Collected Data
            22
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            21
            Virtualization/Sandbox Evasion
            LSASS Memory111
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            11
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDS2
            System Information Discovery
            Distributed Component Object ModelInput Capture3
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Rundll32
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592053 Sample: ET6LdJaK54.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.102 unknown unknown 12->45 47 192.168.2.103 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            ET6LdJaK54.dll95%ReversingLabsWin32.Ransomware.WannaCry
            ET6LdJaK54.dll93%VirustotalBrowse
            ET6LdJaK54.dll100%AviraTR/Ransom.Gen
            ET6LdJaK54.dll100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
            C:\Windows\tasksche.exe100%Joe Sandbox ML
            C:\WINDOWS\qeriuwjhrf (copy)98%ReversingLabsWin32.Ransomware.WannaCry
            C:\Windows\tasksche.exe98%ReversingLabsWin32.Ransomware.WannaCry
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9B0%Avira URL Cloudsafe
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comiA0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            104.16.167.228
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comET6LdJaK54.dllfalse
                  high
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/smssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://www.kryptoslogic.commssecsvc.exe, 00000009.00000002.1729269917.0000000000B04000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Lmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/(3mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9Bmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comiAmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/YCNmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000006.00000002.2341094885.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              150.197.225.3
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              150.197.225.2
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              68.29.208.213
                              unknownUnited States
                              10507SPCSUSfalse
                              87.197.225.184
                              unknownSlovakia (SLOVAK Republic)
                              6855SK-TELEKOMSKfalse
                              150.197.225.1
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              70.146.33.215
                              unknownUnited States
                              6389BELLSOUTH-NET-BLKUSfalse
                              106.230.138.178
                              unknownChina
                              4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                              57.181.230.1
                              unknownBelgium
                              2686ATGS-MMD-ASUSfalse
                              223.189.178.2
                              unknownIndia
                              45609BHARTI-MOBILITY-AS-APBhartiAirtelLtdASforGPRSServicefalse
                              223.189.178.1
                              unknownIndia
                              45609BHARTI-MOBILITY-AS-APBhartiAirtelLtdASforGPRSServicefalse
                              163.210.141.2
                              unknownJapan2516KDDIKDDICORPORATIONJPfalse
                              163.210.141.1
                              unknownJapan2516KDDIKDDICORPORATIONJPfalse
                              164.183.20.1
                              unknownUnited States
                              37717EL-KhawarizmiTNfalse
                              164.183.20.2
                              unknownUnited States
                              37717EL-KhawarizmiTNfalse
                              138.98.68.169
                              unknownUnited States
                              776FR-INRIA-SOPHIAINRIASophia-AntipolisEUfalse
                              68.209.105.69
                              unknownUnited States
                              7018ATT-INTERNET4USfalse
                              24.46.238.1
                              unknownUnited States
                              6128CABLE-NET-1USfalse
                              217.156.218.50
                              unknownUnited Kingdom
                              3549LVLT-3549USfalse
                              57.181.230.105
                              unknownBelgium
                              2686ATGS-MMD-ASUSfalse
                              24.46.238.2
                              unknownUnited States
                              6128CABLE-NET-1USfalse
                              121.43.141.1
                              unknownChina
                              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                              150.197.225.252
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              184.51.220.112
                              unknownUnited States
                              16625AKAMAI-ASUSfalse
                              163.210.141.184
                              unknownJapan2516KDDIKDDICORPORATIONJPfalse
                              24.145.216.1
                              unknownUnited States
                              10796TWC-10796-MIDWESTUSfalse
                              184.51.220.1
                              unknownUnited States
                              16625AKAMAI-ASUSfalse
                              92.159.65.1
                              unknownFrance
                              3215FranceTelecom-OrangeFRfalse
                              87.197.225.1
                              unknownSlovakia (SLOVAK Republic)
                              6855SK-TELEKOMSKfalse
                              IP
                              192.168.2.148
                              192.168.2.149
                              192.168.2.146
                              192.168.2.147
                              192.168.2.140
                              192.168.2.141
                              192.168.2.144
                              192.168.2.145
                              192.168.2.142
                              192.168.2.143
                              192.168.2.159
                              192.168.2.157
                              192.168.2.158
                              192.168.2.151
                              192.168.2.152
                              192.168.2.150
                              192.168.2.155
                              192.168.2.156
                              192.168.2.153
                              192.168.2.154
                              192.168.2.126
                              192.168.2.247
                              192.168.2.127
                              192.168.2.248
                              192.168.2.124
                              192.168.2.245
                              192.168.2.125
                              192.168.2.246
                              192.168.2.128
                              192.168.2.249
                              192.168.2.129
                              192.168.2.240
                              192.168.2.122
                              192.168.2.243
                              192.168.2.123
                              192.168.2.244
                              192.168.2.120
                              192.168.2.241
                              192.168.2.121
                              192.168.2.242
                              192.168.2.97
                              192.168.2.137
                              192.168.2.96
                              192.168.2.138
                              192.168.2.99
                              192.168.2.135
                              192.168.2.98
                              192.168.2.136
                              192.168.2.139
                              192.168.2.250
                              192.168.2.130
                              192.168.2.251
                              192.168.2.91
                              192.168.2.90
                              192.168.2.93
                              192.168.2.133
                              192.168.2.254
                              192.168.2.92
                              192.168.2.134
                              192.168.2.95
                              192.168.2.131
                              192.168.2.252
                              192.168.2.94
                              192.168.2.132
                              192.168.2.253
                              192.168.2.104
                              192.168.2.225
                              192.168.2.105
                              192.168.2.226
                              192.168.2.102
                              192.168.2.223
                              192.168.2.103
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1592053
                              Start date and time:2025-01-15 17:49:06 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 4m 42s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:ET6LdJaK54.dll
                              renamed because original name is a hash value
                              Original Sample Name:ef894d1c6dd120fad5a885bc737d6338.dll
                              Detection:MAL
                              Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                              EGA Information:
                              • Successful, ratio: 66.7%
                              HCA Information:Failed
                              Cookbook Comments:
                              • Found application associated with file extension: .dll
                              • Stop behavior analysis, all processes terminated
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 199.232.214.172, 2.23.77.188, 20.12.23.50, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target tasksche.exe, PID 7676 because there are no executed function
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              11:50:02API Interceptor1x Sleep call for process: loaddll32.exe modified
                              11:50:35API Interceptor112x Sleep call for process: mssecsvc.exe modified
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGeW4GzT8G8.dllGet hashmaliciousVirut, WannacryBrowse
                              • 104.16.166.228
                              JRTn7b1kHg.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              alN48K3xcD.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              XB6SkLK7Al.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              KARINET-ASKoreaAerospaceResearchInstituteKRfrosty.sh4.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.150
                              nklsh4.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.146
                              mips.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.136
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.118.211
                              rebirth.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                              • 150.197.75.138
                              jew.arm6.elfGet hashmaliciousUnknownBrowse
                              • 150.197.254.148
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.129
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.149
                              la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.143
                              c0A15kui8k.elfGet hashmaliciousMirai, MoobotBrowse
                              • 150.197.118.234
                              SPCSUSGn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                              • 184.229.205.229
                              zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                              • 108.104.123.1
                              bot.arm5.elfGet hashmaliciousUnknownBrowse
                              • 108.121.222.207
                              bot.mips.elfGet hashmaliciousUnknownBrowse
                              • 184.216.124.83
                              bot.arm.elfGet hashmaliciousUnknownBrowse
                              • 184.238.141.135
                              i686.elfGet hashmaliciousMiraiBrowse
                              • 173.149.249.224
                              xd.arm.elfGet hashmaliciousMiraiBrowse
                              • 70.1.208.36
                              xd.ppc.elfGet hashmaliciousMiraiBrowse
                              • 108.123.155.22
                              xd.mpsl.elfGet hashmaliciousMiraiBrowse
                              • 173.146.133.53
                              spc.elfGet hashmaliciousMiraiBrowse
                              • 174.153.208.25
                              KARINET-ASKoreaAerospaceResearchInstituteKRfrosty.sh4.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.150
                              nklsh4.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.146
                              mips.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.136
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.118.211
                              rebirth.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                              • 150.197.75.138
                              jew.arm6.elfGet hashmaliciousUnknownBrowse
                              • 150.197.254.148
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.129
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.149
                              la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.143
                              c0A15kui8k.elfGet hashmaliciousMirai, MoobotBrowse
                              • 150.197.118.234
                              SK-TELEKOMSK5.elfGet hashmaliciousUnknownBrowse
                              • 91.127.4.171
                              fuckunix.spc.elfGet hashmaliciousMiraiBrowse
                              • 78.98.93.67
                              nklarm7.elfGet hashmaliciousUnknownBrowse
                              • 213.81.148.95
                              armv4l.elfGet hashmaliciousUnknownBrowse
                              • 213.81.214.137
                              armv7l.elfGet hashmaliciousUnknownBrowse
                              • 78.98.93.60
                              sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 95.102.171.247
                              la.bot.arm.elfGet hashmaliciousMiraiBrowse
                              • 95.102.64.117
                              nshkarm5.elfGet hashmaliciousMiraiBrowse
                              • 78.98.240.177
                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                              • 178.40.197.96
                              arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 193.179.46.12
                              No context
                              No context
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.989728510050888
                              Encrypted:false
                              SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2gCK:QqPe1Cxcxk3ZAEUadzR8yc42
                              MD5:9CACE6E7D4EA5A7A5EC8F43B950B6A94
                              SHA1:943D612A6CD432D5D728B40646DCBE5AEF34F035
                              SHA-256:B0F6A5CE8795C8DD770E2D05CE987439FC1D281E0A113711AD17D9788753C2EC
                              SHA-512:AD061F264A244091DADDB297B3FE5DAFFC8A845E01630D9C7FEC99679A02F7634ED6E9E72C944E49F8EF3AB3E35C68AFDA5783FFF815F4EB0321542224D57C6A
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 98%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.989728510050888
                              Encrypted:false
                              SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2gCK:QqPe1Cxcxk3ZAEUadzR8yc42
                              MD5:9CACE6E7D4EA5A7A5EC8F43B950B6A94
                              SHA1:943D612A6CD432D5D728B40646DCBE5AEF34F035
                              SHA-256:B0F6A5CE8795C8DD770E2D05CE987439FC1D281E0A113711AD17D9788753C2EC
                              SHA-512:AD061F264A244091DADDB297B3FE5DAFFC8A845E01630D9C7FEC99679A02F7634ED6E9E72C944E49F8EF3AB3E35C68AFDA5783FFF815F4EB0321542224D57C6A
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 98%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.3973428538368005
                              TrID:
                              • Win32 Dynamic Link Library (generic) (1002004/3) 98.32%
                              • Windows Screen Saver (13104/52) 1.29%
                              • Generic Win/DOS Executable (2004/3) 0.20%
                              • DOS Executable Generic (2002/1) 0.20%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:ET6LdJaK54.dll
                              File size:5'267'459 bytes
                              MD5:ef894d1c6dd120fad5a885bc737d6338
                              SHA1:5a0b060469b3d9a0ae8b46969e5a92cf7cbcb909
                              SHA256:7f45d112de4bb9aec75ce9e2f22997d10d383fc82c357d1c1f97ea5a10132663
                              SHA512:fd5b844dbf51814963bfb6f307029fc1fbebd58f1eb5ac782d5fcfd99f5e26a1e1bfc44d9027b9d44ea407541a96ed0752d03437c1b912a850ad23831a330c13
                              SSDEEP:98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2gC:+DqPe1Cxcxk3ZAEUadzR8yc4
                              TLSH:F1363360F156E1B8D0112AB0047AA537D2F6BC391A7E6A0F4B40CA7B1E52BB7DF54E07
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                              Icon Hash:7ae282899bbab082
                              Entrypoint:0x100011e9
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x10000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                              DLL Characteristics:
                              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                              Instruction
                              push ebp
                              mov ebp, esp
                              push ebx
                              mov ebx, dword ptr [ebp+08h]
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              push edi
                              mov edi, dword ptr [ebp+10h]
                              test esi, esi
                              jne 00007F64487DD46Bh
                              cmp dword ptr [10003140h], 00000000h
                              jmp 00007F64487DD488h
                              cmp esi, 01h
                              je 00007F64487DD467h
                              cmp esi, 02h
                              jne 00007F64487DD484h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F64487DD46Bh
                              push edi
                              push esi
                              push ebx
                              call eax
                              test eax, eax
                              je 00007F64487DD46Eh
                              push edi
                              push esi
                              push ebx
                              call 00007F64487DD37Ah
                              test eax, eax
                              jne 00007F64487DD466h
                              xor eax, eax
                              jmp 00007F64487DD4B0h
                              push edi
                              push esi
                              push ebx
                              call 00007F64487DD22Ch
                              cmp esi, 01h
                              mov dword ptr [ebp+0Ch], eax
                              jne 00007F64487DD46Eh
                              test eax, eax
                              jne 00007F64487DD499h
                              push edi
                              push eax
                              push ebx
                              call 00007F64487DD356h
                              test esi, esi
                              je 00007F64487DD467h
                              cmp esi, 03h
                              jne 00007F64487DD488h
                              push edi
                              push esi
                              push ebx
                              call 00007F64487DD345h
                              test eax, eax
                              jne 00007F64487DD465h
                              and dword ptr [ebp+0Ch], eax
                              cmp dword ptr [ebp+0Ch], 00000000h
                              je 00007F64487DD473h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F64487DD46Ah
                              push edi
                              push esi
                              push ebx
                              call eax
                              mov dword ptr [ebp+0Ch], eax
                              mov eax, dword ptr [ebp+0Ch]
                              pop edi
                              pop esi
                              pop ebx
                              pop ebp
                              retn 000Ch
                              jmp dword ptr [10002028h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              Programming Language:
                              • [ C ] VS98 (6.0) build 8168
                              • [C++] VS98 (6.0) build 8168
                              • [RES] VS98 (6.0) cvtres build 1720
                              • [LNK] VS98 (6.0) imp/exp build 8168
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x40000x5000600x501000c09b0dc129ef5d2d2e3709117e541661unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              W0x40600x500000dataEnglishUnited States0.8770942687988281
                              DLLImport
                              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                              NameOrdinalAddress
                              PlayGame10x10001114
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-15T17:50:01.018671+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.4562611.1.1.153UDP
                              2025-01-15T17:50:01.514490+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.519492+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449730TCP
                              2025-01-15T17:50:02.251157+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.252214+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449731TCP
                              2025-01-15T17:50:04.837718+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.845918+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449750TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 15, 2025 17:50:01.036472082 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.041316986 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.041392088 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.041515112 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.046251059 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.512963057 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.514344931 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.514489889 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.514683008 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.519491911 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.754759073 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.759751081 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.760373116 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.760481119 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.765300035 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.251010895 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.251157045 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:02.251306057 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:02.252213955 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.252268076 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:02.256052017 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.368428946 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.373322010 CET44549732223.189.178.26192.168.2.4
                              Jan 15, 2025 17:50:02.373410940 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.374802113 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.375097990 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.379596949 CET44549732223.189.178.26192.168.2.4
                              Jan 15, 2025 17:50:02.379662037 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.379893064 CET44549733223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:02.379967928 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.380151033 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.384449959 CET49675443192.168.2.4173.222.162.32
                              Jan 15, 2025 17:50:02.384968996 CET44549733223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:02.385283947 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.433572054 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.438538074 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:02.438620090 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.438817978 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.443593979 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:03.829005957 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:03.835556984 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:03.835632086 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:03.835784912 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:03.841403961 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.322967052 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.837662935 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837680101 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837697983 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837713003 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837718010 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.837728024 CET44549754107.136.9.230192.168.2.4
                              Jan 15, 2025 17:50:04.837759018 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.837759018 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.837786913 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.837853909 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.837856054 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.838171005 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.845917940 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.845935106 CET44549754107.136.9.230192.168.2.4
                              Jan 15, 2025 17:50:04.845953941 CET44549760107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.845982075 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.846076012 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.846117973 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.847256899 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.852006912 CET44549760107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.852021933 CET44549760107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.852061033 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.857274055 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.857321978 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.857378960 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.865904093 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:06.338695049 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.343648911 CET4454977870.146.33.215192.168.2.4
                              Jan 15, 2025 17:50:06.343740940 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.343802929 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.343971968 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.348866940 CET4454977970.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:06.348973036 CET4454977870.146.33.215192.168.2.4
                              Jan 15, 2025 17:50:06.349035025 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.349071980 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.349071980 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.350177050 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.355005980 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:06.355073929 CET4454977970.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:06.355078936 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.355115891 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.355134964 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.359946966 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:08.354587078 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.359591007 CET44549803164.183.20.95192.168.2.4
                              Jan 15, 2025 17:50:08.359704971 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.359755993 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.359977007 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.364747047 CET44549804164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:08.364763021 CET44549803164.183.20.95192.168.2.4
                              Jan 15, 2025 17:50:08.364862919 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.364931107 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.364931107 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.365988970 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.369785070 CET44549804164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:08.369858980 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.370824099 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:08.370888948 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.370963097 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.375683069 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:10.370176077 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.375152111 CET4454982824.46.238.83192.168.2.4
                              Jan 15, 2025 17:50:10.375264883 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.375322104 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.375581980 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.380264997 CET4454982824.46.238.83192.168.2.4
                              Jan 15, 2025 17:50:10.380337000 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.380409956 CET4454982924.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:10.380482912 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.380532980 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.381648064 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.385406971 CET4454982924.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:10.385499954 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.386420965 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:10.386485100 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.386574030 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.391288996 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:12.622167110 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.627505064 CET4454985083.215.79.118192.168.2.4
                              Jan 15, 2025 17:50:12.627597094 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.628937960 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.629122972 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.633817911 CET4454985083.215.79.118192.168.2.4
                              Jan 15, 2025 17:50:12.633898973 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.634068966 CET4454985183.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:12.634130955 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.640481949 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.644697905 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.645338058 CET4454985183.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:12.645391941 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.649542093 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:12.649604082 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.649672985 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.654500008 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.324104071 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.324158907 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:14.324187994 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:14.324248075 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:14.329015017 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.329054117 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.447108030 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.451905012 CET44549875205.202.215.37192.168.2.4
                              Jan 15, 2025 17:50:14.451978922 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.452203989 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.452333927 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.457042933 CET44549875205.202.215.37192.168.2.4
                              Jan 15, 2025 17:50:14.457102060 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.457123041 CET44549876205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:14.457304955 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.457420111 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.457676888 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.462469101 CET44549876205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:14.462496996 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:14.462543011 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.462568045 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.463741064 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.468513012 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:16.470189095 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.475343943 CET44549898163.210.141.184192.168.2.4
                              Jan 15, 2025 17:50:16.475966930 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.476046085 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.476187944 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.480979919 CET44549899163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:16.481057882 CET44549898163.210.141.184192.168.2.4
                              Jan 15, 2025 17:50:16.481069088 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.481116056 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.481288910 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.481790066 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.486180067 CET44549899163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:16.486637115 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:16.486696005 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.486733913 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.492950916 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.497802019 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:17.337860107 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:17.342665911 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:17.342782021 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:17.342822075 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:17.347567081 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:18.495791912 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.500849962 CET44549925138.98.68.169192.168.2.4
                              Jan 15, 2025 17:50:18.500945091 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.501044035 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.501247883 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.506074905 CET44549925138.98.68.169192.168.2.4
                              Jan 15, 2025 17:50:18.506097078 CET44549927138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:18.506160975 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.506217003 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.506309986 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.511251926 CET44549927138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:18.511322021 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.576242924 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.581155062 CET44549928138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:18.581228018 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.581264019 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.586113930 CET44549928138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:19.010138035 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:19.010219097 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:19.010255098 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:19.010324001 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:19.015105009 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:19.015119076 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:19.072283030 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.077230930 CET4454993583.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:19.077299118 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.077325106 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.077719927 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.082406998 CET4454993583.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:19.082458019 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.082623959 CET4454993683.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:19.082681894 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.082712889 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.087519884 CET4454993683.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:20.510137081 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.515073061 CET4454995187.197.225.184192.168.2.4
                              Jan 15, 2025 17:50:20.515283108 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.515470028 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.515810966 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.520348072 CET4454995187.197.225.184192.168.2.4
                              Jan 15, 2025 17:50:20.520406961 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.520586014 CET4454995287.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:20.520642996 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.520673990 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.520946026 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.525572062 CET4454995287.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:20.525656939 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.525727987 CET4454995387.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:20.525784016 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.525810003 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.530529976 CET4454995387.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:22.525415897 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.530548096 CET44549974184.51.220.112192.168.2.4
                              Jan 15, 2025 17:50:22.533978939 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.534013033 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.534245968 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.539181948 CET44549975184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:22.539215088 CET44549974184.51.220.112192.168.2.4
                              Jan 15, 2025 17:50:22.539310932 CET44549974184.51.220.112192.168.2.4
                              Jan 15, 2025 17:50:22.539326906 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.539354086 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.539382935 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.539809942 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.544698954 CET44549975184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:22.544730902 CET44549976184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:22.544776917 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.544846058 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.544899940 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.549762011 CET44549976184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:23.814809084 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:23.815074921 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:23.815372944 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:23.815542936 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:23.820182085 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:23.820318937 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:24.571470976 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.576658964 CET4454999878.237.131.82192.168.2.4
                              Jan 15, 2025 17:50:24.576783895 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.576859951 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.577018023 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.581904888 CET4454999978.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:24.582012892 CET4454999878.237.131.82192.168.2.4
                              Jan 15, 2025 17:50:24.582041979 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.582063913 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.586863995 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.589176893 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.591768026 CET4454999978.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:24.591846943 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.594213009 CET4455000078.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:24.594343901 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.598905087 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.603810072 CET4455000078.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:26.220664024 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:26.220794916 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:26.220886946 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:26.220947027 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:26.225781918 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:26.225809097 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:26.573319912 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.578551054 CET44550023192.88.130.80192.168.2.4
                              Jan 15, 2025 17:50:26.578660965 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.578752041 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.578931093 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.583846092 CET44550024192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.583879948 CET44550023192.88.130.80192.168.2.4
                              Jan 15, 2025 17:50:26.583919048 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.583959103 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.584055901 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.584433079 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.589056969 CET44550024192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.589117050 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.589314938 CET44550025192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.589385986 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.589430094 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.594305992 CET44550025192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.824424982 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:26.829493999 CET44550028223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:26.829575062 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:26.829684973 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:26.834491968 CET44550028223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:27.721019030 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:27.721127987 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:27.721478939 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:27.721543074 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:27.726325989 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:27.726339102 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:28.588193893 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.593334913 CET44550040114.79.43.81192.168.2.4
                              Jan 15, 2025 17:50:28.593440056 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.593502045 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.593729019 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.598625898 CET44550040114.79.43.81192.168.2.4
                              Jan 15, 2025 17:50:28.598661900 CET44550041114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:28.598692894 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.598726034 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.598829031 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.599097013 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.603725910 CET44550041114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:28.603781939 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.603924990 CET44550042114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:28.603993893 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.604022980 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.608912945 CET44550042114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:29.228476048 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:29.233580112 CET44550043107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:29.233963013 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:29.234013081 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:29.238840103 CET44550043107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:29.752170086 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:29.752290010 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:29.752427101 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:29.752511024 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:29.757206917 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:29.757265091 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:30.630592108 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.635476112 CET44550044217.156.218.50192.168.2.4
                              Jan 15, 2025 17:50:30.635577917 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.646156073 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.646409988 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.651088953 CET44550044217.156.218.50192.168.2.4
                              Jan 15, 2025 17:50:30.651170969 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.651213884 CET44550045217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.651278973 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.651890039 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.654421091 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.656655073 CET44550045217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.656724930 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.659214973 CET44550046217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.659275055 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.659311056 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.664041042 CET44550046217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.732403040 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:30.737343073 CET4455004770.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:30.737452030 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:30.737571955 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:30.742300987 CET4455004770.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:31.754337072 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:31.754484892 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:31.754616976 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:31.754709959 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:31.759371042 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:31.759444952 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:32.635087013 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.640032053 CET44550048116.93.136.76192.168.2.4
                              Jan 15, 2025 17:50:32.641985893 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.642019033 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.642222881 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.646987915 CET44550048116.93.136.76192.168.2.4
                              Jan 15, 2025 17:50:32.647012949 CET44550049116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.647072077 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.647102118 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.647207022 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.647499084 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.652095079 CET44550049116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.652331114 CET44550050116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.652479887 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.652538061 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.652607918 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.657342911 CET44550050116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.760441065 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:32.765608072 CET44550051164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:32.765969038 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:32.766005993 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:32.770814896 CET44550051164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:34.650619030 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.655644894 CET4455005249.0.35.40192.168.2.4
                              Jan 15, 2025 17:50:34.655960083 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.655996084 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.656157017 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.660888910 CET4455005349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.660967112 CET4455005249.0.35.40192.168.2.4
                              Jan 15, 2025 17:50:34.661076069 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.661106110 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.661231995 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.661537886 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.666385889 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.667105913 CET4455005349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.667190075 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.667217970 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.672022104 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.674350023 CET4455005349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.677962065 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.759660959 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:34.764539957 CET4455005524.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:34.764938116 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:34.765003920 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:34.769721031 CET4455005524.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:35.846113920 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:35.846183062 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:35.846350908 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:35.846452951 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:35.851140022 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:35.851165056 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:36.667103052 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.672096014 CET4455005668.224.30.161192.168.2.4
                              Jan 15, 2025 17:50:36.673949003 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.674037933 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.674230099 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.678946972 CET4455005668.224.30.161192.168.2.4
                              Jan 15, 2025 17:50:36.678973913 CET4455005768.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.679032087 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.679054976 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.679155111 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.679435968 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.683974028 CET4455005768.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.684035063 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.684242964 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.684295893 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.684442043 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.689228058 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.964633942 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:36.964694977 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:36.964761019 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:36.964806080 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:36.969470978 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:36.969520092 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:37.881700993 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:37.881803036 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:37.881855011 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:37.881905079 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:37.886646032 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:37.886660099 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:38.293397903 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:38.293518066 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:38.293611050 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:38.293679953 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:38.298507929 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:38.298518896 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:38.541588068 CET50059445192.168.2.424.145.216.55
                              Jan 15, 2025 17:50:38.774471045 CET4455005924.145.216.55192.168.2.4
                              Jan 15, 2025 17:50:38.774569035 CET50059445192.168.2.424.145.216.55
                              Jan 15, 2025 17:50:38.774777889 CET50059445192.168.2.424.145.216.55
                              Jan 15, 2025 17:50:38.774889946 CET50060445192.168.2.424.145.216.1
                              Jan 15, 2025 17:50:38.779710054 CET4455005924.145.216.55192.168.2.4
                              Jan 15, 2025 17:50:38.779763937 CET50059445192.168.2.424.145.216.55
                              Jan 15, 2025 17:50:38.779798031 CET4455006024.145.216.1192.168.2.4
                              Jan 15, 2025 17:50:38.779855013 CET50060445192.168.2.424.145.216.1
                              Jan 15, 2025 17:50:38.780906916 CET50060445192.168.2.424.145.216.1
                              Jan 15, 2025 17:50:38.781419039 CET50061445192.168.2.424.145.216.1
                              Jan 15, 2025 17:50:38.785907030 CET4455006024.145.216.1192.168.2.4
                              Jan 15, 2025 17:50:38.785975933 CET50060445192.168.2.424.145.216.1
                              Jan 15, 2025 17:50:38.786247969 CET4455006124.145.216.1192.168.2.4
                              Jan 15, 2025 17:50:38.786336899 CET50061445192.168.2.424.145.216.1
                              Jan 15, 2025 17:50:38.787270069 CET50061445192.168.2.424.145.216.1
                              Jan 15, 2025 17:50:38.792067051 CET4455006124.145.216.1192.168.2.4
                              Jan 15, 2025 17:50:38.853744030 CET50062445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:38.858782053 CET44550062205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:38.858877897 CET50062445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:38.858946085 CET50062445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:38.863754988 CET44550062205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:39.976778984 CET44549928138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:39.976906061 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:39.976963043 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:39.977010965 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:39.978252888 CET50063445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:39.981780052 CET44549928138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:39.981792927 CET44549928138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:39.983086109 CET4455006349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:39.983186960 CET50063445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:39.983217955 CET50063445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:39.988007069 CET4455006349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:40.291282892 CET50064445192.168.2.4133.105.26.250
                              Jan 15, 2025 17:50:40.296500921 CET44550064133.105.26.250192.168.2.4
                              Jan 15, 2025 17:50:40.296638012 CET50064445192.168.2.4133.105.26.250
                              Jan 15, 2025 17:50:40.296766043 CET50064445192.168.2.4133.105.26.250
                              Jan 15, 2025 17:50:40.296889067 CET50065445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:50:40.301747084 CET44550065133.105.26.1192.168.2.4
                              Jan 15, 2025 17:50:40.301814079 CET50065445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:50:40.301837921 CET50065445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:50:40.302489042 CET50066445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:50:40.304363012 CET44550064133.105.26.250192.168.2.4
                              Jan 15, 2025 17:50:40.304423094 CET50064445192.168.2.4133.105.26.250
                              Jan 15, 2025 17:50:40.306818962 CET44550065133.105.26.1192.168.2.4
                              Jan 15, 2025 17:50:40.306869984 CET50065445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:50:40.307333946 CET44550066133.105.26.1192.168.2.4
                              Jan 15, 2025 17:50:40.307391882 CET50066445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:50:40.307425976 CET50066445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:50:40.312235117 CET44550066133.105.26.1192.168.2.4
                              Jan 15, 2025 17:50:40.455626011 CET4454993683.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:40.455749989 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:40.455837965 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:40.455889940 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:40.460624933 CET4454993683.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:40.460721016 CET4454993683.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:40.885313988 CET50067445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:40.890223026 CET44550067163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:40.890300035 CET50067445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:40.890356064 CET50067445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:40.895209074 CET44550067163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:41.306463003 CET50068445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:41.311444998 CET4455006868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:41.311656952 CET50068445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:41.311814070 CET50068445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:41.316560984 CET4455006868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:41.924328089 CET4454995387.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:41.924432039 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:41.946609974 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:41.946755886 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:41.951500893 CET4454995387.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:41.951580048 CET4454995387.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:42.203809977 CET50069445192.168.2.468.209.105.69
                              Jan 15, 2025 17:50:42.208765984 CET4455006968.209.105.69192.168.2.4
                              Jan 15, 2025 17:50:42.208828926 CET50069445192.168.2.468.209.105.69
                              Jan 15, 2025 17:50:42.208878040 CET50069445192.168.2.468.209.105.69
                              Jan 15, 2025 17:50:42.209105015 CET50070445192.168.2.468.209.105.1
                              Jan 15, 2025 17:50:42.213952065 CET4455007068.209.105.1192.168.2.4
                              Jan 15, 2025 17:50:42.214016914 CET4455006968.209.105.69192.168.2.4
                              Jan 15, 2025 17:50:42.214025021 CET50070445192.168.2.468.209.105.1
                              Jan 15, 2025 17:50:42.214060068 CET50069445192.168.2.468.209.105.69
                              Jan 15, 2025 17:50:42.214167118 CET50070445192.168.2.468.209.105.1
                              Jan 15, 2025 17:50:42.218997002 CET4455007068.209.105.1192.168.2.4
                              Jan 15, 2025 17:50:42.219049931 CET50070445192.168.2.468.209.105.1
                              Jan 15, 2025 17:50:42.219530106 CET50071445192.168.2.468.209.105.1
                              Jan 15, 2025 17:50:42.224296093 CET4455007168.209.105.1192.168.2.4
                              Jan 15, 2025 17:50:42.224366903 CET50071445192.168.2.468.209.105.1
                              Jan 15, 2025 17:50:42.224481106 CET50071445192.168.2.468.209.105.1
                              Jan 15, 2025 17:50:42.229238987 CET4455007168.209.105.1192.168.2.4
                              Jan 15, 2025 17:50:42.253839016 CET4455006349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:42.253921986 CET50063445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:42.260154963 CET50063445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:42.260185957 CET50063445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:42.265122890 CET4455006349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:42.265156984 CET4455006349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:42.398813963 CET50072445192.168.2.449.0.35.2
                              Jan 15, 2025 17:50:42.403609991 CET4455007249.0.35.2192.168.2.4
                              Jan 15, 2025 17:50:42.403673887 CET50072445192.168.2.449.0.35.2
                              Jan 15, 2025 17:50:42.405761957 CET50072445192.168.2.449.0.35.2
                              Jan 15, 2025 17:50:42.411031961 CET4455007249.0.35.2192.168.2.4
                              Jan 15, 2025 17:50:42.411169052 CET4455007249.0.35.2192.168.2.4
                              Jan 15, 2025 17:50:42.411211014 CET50072445192.168.2.449.0.35.2
                              Jan 15, 2025 17:50:42.425093889 CET50073445192.168.2.449.0.35.2
                              Jan 15, 2025 17:50:42.429912090 CET4455007349.0.35.2192.168.2.4
                              Jan 15, 2025 17:50:42.429971933 CET50073445192.168.2.449.0.35.2
                              Jan 15, 2025 17:50:42.433242083 CET50073445192.168.2.449.0.35.2
                              Jan 15, 2025 17:50:42.438060045 CET4455007349.0.35.2192.168.2.4
                              Jan 15, 2025 17:50:42.951870918 CET4455006868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:42.952007055 CET50068445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:42.952162981 CET50068445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:42.952163935 CET50068445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:42.956990957 CET4455006868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:42.957046986 CET4455006868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:42.978405952 CET50074445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:42.983361959 CET44550074138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:42.983448029 CET50074445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:42.983488083 CET50074445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:42.988490105 CET44550074138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:43.009774923 CET50075445192.168.2.468.224.30.2
                              Jan 15, 2025 17:50:43.014863014 CET4455007568.224.30.2192.168.2.4
                              Jan 15, 2025 17:50:43.014991999 CET50075445192.168.2.468.224.30.2
                              Jan 15, 2025 17:50:43.014991999 CET50075445192.168.2.468.224.30.2
                              Jan 15, 2025 17:50:43.015357971 CET50076445192.168.2.468.224.30.2
                              Jan 15, 2025 17:50:43.020121098 CET4455007568.224.30.2192.168.2.4
                              Jan 15, 2025 17:50:43.020185947 CET4455007668.224.30.2192.168.2.4
                              Jan 15, 2025 17:50:43.020196915 CET50075445192.168.2.468.224.30.2
                              Jan 15, 2025 17:50:43.020245075 CET50076445192.168.2.468.224.30.2
                              Jan 15, 2025 17:50:43.020275116 CET50076445192.168.2.468.224.30.2
                              Jan 15, 2025 17:50:43.025094986 CET4455007668.224.30.2192.168.2.4
                              Jan 15, 2025 17:50:43.462759972 CET50077445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:43.467801094 CET4455007783.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:43.467900991 CET50077445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:43.467922926 CET50077445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:43.472762108 CET4455007783.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:43.603621006 CET50078445192.168.2.4121.43.141.23
                              Jan 15, 2025 17:50:43.608861923 CET44550078121.43.141.23192.168.2.4
                              Jan 15, 2025 17:50:43.612227917 CET50078445192.168.2.4121.43.141.23
                              Jan 15, 2025 17:50:43.612284899 CET50078445192.168.2.4121.43.141.23
                              Jan 15, 2025 17:50:43.612526894 CET50079445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:50:43.617300034 CET44550078121.43.141.23192.168.2.4
                              Jan 15, 2025 17:50:43.617433071 CET44550079121.43.141.1192.168.2.4
                              Jan 15, 2025 17:50:43.617496967 CET50078445192.168.2.4121.43.141.23
                              Jan 15, 2025 17:50:43.617535114 CET50079445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:50:43.617641926 CET50079445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:50:43.617980957 CET50080445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:50:43.622565031 CET44550079121.43.141.1192.168.2.4
                              Jan 15, 2025 17:50:43.622844934 CET44550080121.43.141.1192.168.2.4
                              Jan 15, 2025 17:50:43.622946024 CET50079445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:50:43.622970104 CET50080445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:50:43.623008013 CET50080445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:50:43.627824068 CET44550080121.43.141.1192.168.2.4
                              Jan 15, 2025 17:50:43.910784006 CET44549976184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:43.911952019 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:43.912051916 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:43.912137032 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:43.916826010 CET44549976184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:43.916908026 CET44549976184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:44.969253063 CET50081445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:44.974291086 CET4455008187.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:44.974374056 CET50081445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:44.976978064 CET50081445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:44.981781006 CET4455008187.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:45.057694912 CET50082445192.168.2.492.159.65.23
                              Jan 15, 2025 17:50:45.062669992 CET4455008292.159.65.23192.168.2.4
                              Jan 15, 2025 17:50:45.062743902 CET50082445192.168.2.492.159.65.23
                              Jan 15, 2025 17:50:45.069207907 CET50082445192.168.2.492.159.65.23
                              Jan 15, 2025 17:50:45.069427013 CET50083445192.168.2.492.159.65.1
                              Jan 15, 2025 17:50:45.074285984 CET4455008392.159.65.1192.168.2.4
                              Jan 15, 2025 17:50:45.074377060 CET50083445192.168.2.492.159.65.1
                              Jan 15, 2025 17:50:45.074979067 CET4455008292.159.65.23192.168.2.4
                              Jan 15, 2025 17:50:45.075041056 CET50082445192.168.2.492.159.65.23
                              Jan 15, 2025 17:50:45.082215071 CET50083445192.168.2.492.159.65.1
                              Jan 15, 2025 17:50:45.087730885 CET4455008392.159.65.1192.168.2.4
                              Jan 15, 2025 17:50:45.087816000 CET50083445192.168.2.492.159.65.1
                              Jan 15, 2025 17:50:45.129519939 CET50084445192.168.2.492.159.65.1
                              Jan 15, 2025 17:50:45.134453058 CET4455008492.159.65.1192.168.2.4
                              Jan 15, 2025 17:50:45.134536028 CET50084445192.168.2.492.159.65.1
                              Jan 15, 2025 17:50:45.134593010 CET50084445192.168.2.492.159.65.1
                              Jan 15, 2025 17:50:45.139437914 CET4455008492.159.65.1192.168.2.4
                              Jan 15, 2025 17:50:45.971271038 CET4455000078.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:45.971338034 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:45.971383095 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:45.971419096 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:45.976265907 CET4455000078.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:45.976284027 CET4455000078.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:46.384906054 CET50085445192.168.2.457.181.230.105
                              Jan 15, 2025 17:50:46.389909983 CET4455008557.181.230.105192.168.2.4
                              Jan 15, 2025 17:50:46.390018940 CET50085445192.168.2.457.181.230.105
                              Jan 15, 2025 17:50:46.390067101 CET50085445192.168.2.457.181.230.105
                              Jan 15, 2025 17:50:46.390275002 CET50086445192.168.2.457.181.230.1
                              Jan 15, 2025 17:50:46.395126104 CET4455008557.181.230.105192.168.2.4
                              Jan 15, 2025 17:50:46.395144939 CET4455008657.181.230.1192.168.2.4
                              Jan 15, 2025 17:50:46.395246029 CET4455008557.181.230.105192.168.2.4
                              Jan 15, 2025 17:50:46.395248890 CET50086445192.168.2.457.181.230.1
                              Jan 15, 2025 17:50:46.395289898 CET50085445192.168.2.457.181.230.105
                              Jan 15, 2025 17:50:46.395407915 CET50086445192.168.2.457.181.230.1
                              Jan 15, 2025 17:50:46.395730019 CET50087445192.168.2.457.181.230.1
                              Jan 15, 2025 17:50:46.400556087 CET4455008757.181.230.1192.168.2.4
                              Jan 15, 2025 17:50:46.400639057 CET50087445192.168.2.457.181.230.1
                              Jan 15, 2025 17:50:46.400666952 CET50087445192.168.2.457.181.230.1
                              Jan 15, 2025 17:50:46.401194096 CET4455008657.181.230.1192.168.2.4
                              Jan 15, 2025 17:50:46.401254892 CET50086445192.168.2.457.181.230.1
                              Jan 15, 2025 17:50:46.405517101 CET4455008757.181.230.1192.168.2.4
                              Jan 15, 2025 17:50:46.915925980 CET50088445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:46.920958042 CET44550088184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:46.921093941 CET50088445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:46.921133041 CET50088445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:46.925890923 CET44550088184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:47.619750023 CET50089445192.168.2.4150.197.225.252
                              Jan 15, 2025 17:50:47.624591112 CET44550089150.197.225.252192.168.2.4
                              Jan 15, 2025 17:50:47.624708891 CET50089445192.168.2.4150.197.225.252
                              Jan 15, 2025 17:50:47.624789953 CET50089445192.168.2.4150.197.225.252
                              Jan 15, 2025 17:50:47.624934912 CET50090445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:47.629698038 CET44550090150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:47.629775047 CET50090445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:47.629818916 CET50090445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:47.629892111 CET44550089150.197.225.252192.168.2.4
                              Jan 15, 2025 17:50:47.629956007 CET50089445192.168.2.4150.197.225.252
                              Jan 15, 2025 17:50:47.630229950 CET50091445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:47.634749889 CET44550090150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:47.634810925 CET50090445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:47.635035992 CET44550091150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:47.635094881 CET50091445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:47.635534048 CET50091445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:47.640363932 CET44550091150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:47.961471081 CET44550025192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:47.961678028 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:47.968018055 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:47.968069077 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:47.972886086 CET44550025192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:47.972897053 CET44550025192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:48.175214052 CET44550028223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:48.175285101 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:48.175383091 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:48.175626040 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:48.180171967 CET44550028223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:48.180435896 CET44550028223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:48.250354052 CET50092445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:50:48.255224943 CET44550092223.189.178.2192.168.2.4
                              Jan 15, 2025 17:50:48.255287886 CET50092445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:50:48.255383015 CET50092445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:50:48.260332108 CET44550092223.189.178.2192.168.2.4
                              Jan 15, 2025 17:50:48.260384083 CET50092445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:50:48.386662960 CET50093445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:50:48.391578913 CET44550093223.189.178.2192.168.2.4
                              Jan 15, 2025 17:50:48.391691923 CET50093445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:50:48.400088072 CET50093445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:50:48.404968977 CET44550093223.189.178.2192.168.2.4
                              Jan 15, 2025 17:50:48.775546074 CET50094445192.168.2.480.25.124.2
                              Jan 15, 2025 17:50:48.780574083 CET4455009480.25.124.2192.168.2.4
                              Jan 15, 2025 17:50:48.780642033 CET50094445192.168.2.480.25.124.2
                              Jan 15, 2025 17:50:48.780725002 CET50094445192.168.2.480.25.124.2
                              Jan 15, 2025 17:50:48.780917883 CET50095445192.168.2.480.25.124.1
                              Jan 15, 2025 17:50:48.785744905 CET4455009580.25.124.1192.168.2.4
                              Jan 15, 2025 17:50:48.787045956 CET4455009480.25.124.2192.168.2.4
                              Jan 15, 2025 17:50:48.787503004 CET50095445192.168.2.480.25.124.1
                              Jan 15, 2025 17:50:48.787580013 CET50095445192.168.2.480.25.124.1
                              Jan 15, 2025 17:50:48.787971020 CET50096445192.168.2.480.25.124.1
                              Jan 15, 2025 17:50:48.792788982 CET4455009480.25.124.2192.168.2.4
                              Jan 15, 2025 17:50:48.792800903 CET4455009680.25.124.1192.168.2.4
                              Jan 15, 2025 17:50:48.792840958 CET50094445192.168.2.480.25.124.2
                              Jan 15, 2025 17:50:48.792915106 CET50096445192.168.2.480.25.124.1
                              Jan 15, 2025 17:50:48.792915106 CET50096445192.168.2.480.25.124.1
                              Jan 15, 2025 17:50:48.793509007 CET4455009580.25.124.1192.168.2.4
                              Jan 15, 2025 17:50:48.793549061 CET50095445192.168.2.480.25.124.1
                              Jan 15, 2025 17:50:48.797718048 CET4455009680.25.124.1192.168.2.4
                              Jan 15, 2025 17:50:48.978882074 CET50097445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:48.983949900 CET4455009778.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:48.984057903 CET50097445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:48.984122992 CET50097445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:48.988905907 CET4455009778.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:49.557235003 CET44550091150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:49.557349920 CET50091445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:49.557451963 CET50091445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:49.557451963 CET50091445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:49.562275887 CET44550091150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:49.562290907 CET44550091150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:49.853737116 CET50098445192.168.2.439.154.148.33
                              Jan 15, 2025 17:50:49.858697891 CET4455009839.154.148.33192.168.2.4
                              Jan 15, 2025 17:50:49.859817028 CET50098445192.168.2.439.154.148.33
                              Jan 15, 2025 17:50:49.859873056 CET50098445192.168.2.439.154.148.33
                              Jan 15, 2025 17:50:49.860060930 CET50099445192.168.2.439.154.148.1
                              Jan 15, 2025 17:50:49.864855051 CET4455009839.154.148.33192.168.2.4
                              Jan 15, 2025 17:50:49.864912987 CET4455009939.154.148.1192.168.2.4
                              Jan 15, 2025 17:50:49.864989996 CET50098445192.168.2.439.154.148.33
                              Jan 15, 2025 17:50:49.865022898 CET50099445192.168.2.439.154.148.1
                              Jan 15, 2025 17:50:49.865108967 CET50099445192.168.2.439.154.148.1
                              Jan 15, 2025 17:50:49.865453005 CET50100445192.168.2.439.154.148.1
                              Jan 15, 2025 17:50:49.870016098 CET4455009939.154.148.1192.168.2.4
                              Jan 15, 2025 17:50:49.870089054 CET50099445192.168.2.439.154.148.1
                              Jan 15, 2025 17:50:49.870306969 CET4455010039.154.148.1192.168.2.4
                              Jan 15, 2025 17:50:49.870418072 CET50100445192.168.2.439.154.148.1
                              Jan 15, 2025 17:50:49.870507956 CET50100445192.168.2.439.154.148.1
                              Jan 15, 2025 17:50:49.875348091 CET4455010039.154.148.1192.168.2.4
                              Jan 15, 2025 17:50:49.971494913 CET44550042114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:49.973937035 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:49.973968029 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:49.974025011 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:49.978748083 CET44550042114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:49.978842974 CET44550042114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:50.597114086 CET44550043107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:50.597300053 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:50.597466946 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:50.597466946 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:50.602277994 CET44550043107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:50.602291107 CET44550043107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:50.654154062 CET50101445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:50:50.658965111 CET44550101107.136.9.2192.168.2.4
                              Jan 15, 2025 17:50:50.659034967 CET50101445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:50:50.659112930 CET50101445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:50:50.659523010 CET50102445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:50:50.664108038 CET44550101107.136.9.2192.168.2.4
                              Jan 15, 2025 17:50:50.664176941 CET50101445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:50:50.664329052 CET44550102107.136.9.2192.168.2.4
                              Jan 15, 2025 17:50:50.664392948 CET50102445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:50:50.664441109 CET50102445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:50:50.669171095 CET44550102107.136.9.2192.168.2.4
                              Jan 15, 2025 17:50:50.910548925 CET50103445192.168.2.421.144.68.36
                              Jan 15, 2025 17:50:50.915448904 CET4455010321.144.68.36192.168.2.4
                              Jan 15, 2025 17:50:50.915554047 CET50103445192.168.2.421.144.68.36
                              Jan 15, 2025 17:50:50.916863918 CET50103445192.168.2.421.144.68.36
                              Jan 15, 2025 17:50:50.917624950 CET50104445192.168.2.421.144.68.1
                              Jan 15, 2025 17:50:50.921732903 CET4455010321.144.68.36192.168.2.4
                              Jan 15, 2025 17:50:50.921822071 CET50103445192.168.2.421.144.68.36
                              Jan 15, 2025 17:50:50.922384977 CET4455010421.144.68.1192.168.2.4
                              Jan 15, 2025 17:50:50.922463894 CET50104445192.168.2.421.144.68.1
                              Jan 15, 2025 17:50:51.006164074 CET50104445192.168.2.421.144.68.1
                              Jan 15, 2025 17:50:51.006541967 CET50105445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:51.006867886 CET50106445192.168.2.421.144.68.1
                              Jan 15, 2025 17:50:51.011122942 CET4455010421.144.68.1192.168.2.4
                              Jan 15, 2025 17:50:51.011286020 CET44550105192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:51.011363983 CET50105445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:51.011512995 CET50105445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:51.011639118 CET4455010621.144.68.1192.168.2.4
                              Jan 15, 2025 17:50:51.011693954 CET50106445192.168.2.421.144.68.1
                              Jan 15, 2025 17:50:51.011734962 CET50106445192.168.2.421.144.68.1
                              Jan 15, 2025 17:50:51.012444973 CET4455010421.144.68.1192.168.2.4
                              Jan 15, 2025 17:50:51.012499094 CET50104445192.168.2.421.144.68.1
                              Jan 15, 2025 17:50:51.016266108 CET44550105192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:51.016453028 CET4455010621.144.68.1192.168.2.4
                              Jan 15, 2025 17:50:51.822813034 CET50107445192.168.2.4106.230.138.178
                              Jan 15, 2025 17:50:51.827744961 CET44550107106.230.138.178192.168.2.4
                              Jan 15, 2025 17:50:51.827815056 CET50107445192.168.2.4106.230.138.178
                              Jan 15, 2025 17:50:51.827936888 CET50107445192.168.2.4106.230.138.178
                              Jan 15, 2025 17:50:51.828123093 CET50108445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:50:51.832772970 CET44550107106.230.138.178192.168.2.4
                              Jan 15, 2025 17:50:51.832825899 CET50107445192.168.2.4106.230.138.178
                              Jan 15, 2025 17:50:51.832876921 CET44550108106.230.138.1192.168.2.4
                              Jan 15, 2025 17:50:51.832928896 CET50108445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:50:51.833081961 CET50108445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:50:51.833554029 CET50109445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:50:51.837914944 CET44550108106.230.138.1192.168.2.4
                              Jan 15, 2025 17:50:51.837959051 CET50108445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:50:51.838366985 CET44550109106.230.138.1192.168.2.4
                              Jan 15, 2025 17:50:51.838422060 CET50109445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:50:51.838458061 CET50109445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:50:51.843226910 CET44550109106.230.138.1192.168.2.4
                              Jan 15, 2025 17:50:52.039459944 CET44550046217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:52.039560080 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:52.041786909 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:52.041845083 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:52.046554089 CET44550046217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:52.046564102 CET44550046217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:52.111979008 CET4455004770.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:52.112072945 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:52.112160921 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:52.112230062 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:52.116920948 CET4455004770.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:52.116940975 CET4455004770.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:52.166011095 CET50110445192.168.2.470.146.33.2
                              Jan 15, 2025 17:50:52.170912027 CET4455011070.146.33.2192.168.2.4
                              Jan 15, 2025 17:50:52.170999050 CET50110445192.168.2.470.146.33.2
                              Jan 15, 2025 17:50:52.171034098 CET50110445192.168.2.470.146.33.2
                              Jan 15, 2025 17:50:52.171479940 CET50111445192.168.2.470.146.33.2
                              Jan 15, 2025 17:50:52.176042080 CET4455011070.146.33.2192.168.2.4
                              Jan 15, 2025 17:50:52.176115036 CET50110445192.168.2.470.146.33.2
                              Jan 15, 2025 17:50:52.176258087 CET4455011170.146.33.2192.168.2.4
                              Jan 15, 2025 17:50:52.176315069 CET50111445192.168.2.470.146.33.2
                              Jan 15, 2025 17:50:52.176363945 CET50111445192.168.2.470.146.33.2
                              Jan 15, 2025 17:50:52.181106091 CET4455011170.146.33.2192.168.2.4
                              Jan 15, 2025 17:50:52.572055101 CET50112445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:52.576972961 CET44550112150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:52.577083111 CET50112445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:52.577131987 CET50112445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:52.581939936 CET44550112150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:52.700490952 CET50113445192.168.2.4200.9.23.3
                              Jan 15, 2025 17:50:52.705478907 CET44550113200.9.23.3192.168.2.4
                              Jan 15, 2025 17:50:52.705619097 CET50113445192.168.2.4200.9.23.3
                              Jan 15, 2025 17:50:52.705739021 CET50113445192.168.2.4200.9.23.3
                              Jan 15, 2025 17:50:52.710692883 CET44550113200.9.23.3192.168.2.4
                              Jan 15, 2025 17:50:52.710793018 CET50113445192.168.2.4200.9.23.3
                              Jan 15, 2025 17:50:52.714890003 CET50114445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:50:52.719681025 CET44550114200.9.23.1192.168.2.4
                              Jan 15, 2025 17:50:52.719764948 CET50114445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:50:52.719893932 CET50114445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:50:52.720371008 CET50115445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:50:52.725159883 CET44550115200.9.23.1192.168.2.4
                              Jan 15, 2025 17:50:52.725231886 CET50115445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:50:52.725263119 CET50115445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:50:52.725842953 CET44550114200.9.23.1192.168.2.4
                              Jan 15, 2025 17:50:52.725893974 CET50114445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:50:52.730029106 CET44550115200.9.23.1192.168.2.4
                              Jan 15, 2025 17:50:52.978279114 CET50116445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:52.983179092 CET44550116114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:52.983266115 CET50116445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:52.983331919 CET50116445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:52.988086939 CET44550116114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:53.525667906 CET50117445192.168.2.4209.56.1.159
                              Jan 15, 2025 17:50:53.530565977 CET44550117209.56.1.159192.168.2.4
                              Jan 15, 2025 17:50:53.530674934 CET50117445192.168.2.4209.56.1.159
                              Jan 15, 2025 17:50:53.530775070 CET50117445192.168.2.4209.56.1.159
                              Jan 15, 2025 17:50:53.530994892 CET50118445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:50:53.535680056 CET44550117209.56.1.159192.168.2.4
                              Jan 15, 2025 17:50:53.535752058 CET50117445192.168.2.4209.56.1.159
                              Jan 15, 2025 17:50:53.535846949 CET44550118209.56.1.1192.168.2.4
                              Jan 15, 2025 17:50:53.535917997 CET50118445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:50:53.535931110 CET50118445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:50:53.536330938 CET50119445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:50:53.540884972 CET44550118209.56.1.1192.168.2.4
                              Jan 15, 2025 17:50:53.540951014 CET50118445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:50:53.541131020 CET44550119209.56.1.1192.168.2.4
                              Jan 15, 2025 17:50:53.541201115 CET50119445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:50:53.541244030 CET50119445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:50:53.546019077 CET44550119209.56.1.1192.168.2.4
                              Jan 15, 2025 17:50:54.034102917 CET44550050116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:54.034188032 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:54.034245014 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:54.034307957 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:54.039045095 CET44550050116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:54.039060116 CET44550050116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:54.164736986 CET44550051164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:54.164963961 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:54.165041924 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:54.165041924 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:54.169857979 CET44550051164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:54.169872046 CET44550051164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:54.229415894 CET50120445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:50:54.234288931 CET44550120164.183.20.2192.168.2.4
                              Jan 15, 2025 17:50:54.234359980 CET50120445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:50:54.238373995 CET50120445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:50:54.243216038 CET50121445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:50:54.243231058 CET44550120164.183.20.2192.168.2.4
                              Jan 15, 2025 17:50:54.243352890 CET50120445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:50:54.248006105 CET44550121164.183.20.2192.168.2.4
                              Jan 15, 2025 17:50:54.248076916 CET50121445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:50:54.248222113 CET50121445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:50:54.252954006 CET44550121164.183.20.2192.168.2.4
                              Jan 15, 2025 17:50:54.361530066 CET50122445192.168.2.468.29.208.213
                              Jan 15, 2025 17:50:54.366540909 CET4455012268.29.208.213192.168.2.4
                              Jan 15, 2025 17:50:54.366616964 CET50122445192.168.2.468.29.208.213
                              Jan 15, 2025 17:50:54.370529890 CET50122445192.168.2.468.29.208.213
                              Jan 15, 2025 17:50:54.370722055 CET50123445192.168.2.468.29.208.1
                              Jan 15, 2025 17:50:54.375437021 CET4455012268.29.208.213192.168.2.4
                              Jan 15, 2025 17:50:54.375488997 CET50122445192.168.2.468.29.208.213
                              Jan 15, 2025 17:50:54.375612020 CET4455012368.29.208.1192.168.2.4
                              Jan 15, 2025 17:50:54.375690937 CET50123445192.168.2.468.29.208.1
                              Jan 15, 2025 17:50:54.383220911 CET50123445192.168.2.468.29.208.1
                              Jan 15, 2025 17:50:54.388076067 CET4455012368.29.208.1192.168.2.4
                              Jan 15, 2025 17:50:54.388245106 CET50123445192.168.2.468.29.208.1
                              Jan 15, 2025 17:50:54.450140953 CET50124445192.168.2.468.29.208.1
                              Jan 15, 2025 17:50:54.455066919 CET4455012468.29.208.1192.168.2.4
                              Jan 15, 2025 17:50:54.455151081 CET50124445192.168.2.468.29.208.1
                              Jan 15, 2025 17:50:54.462980032 CET50124445192.168.2.468.29.208.1
                              Jan 15, 2025 17:50:54.467794895 CET4455012468.29.208.1192.168.2.4
                              Jan 15, 2025 17:50:54.545802116 CET44550112150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:54.545876026 CET50112445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:54.553178072 CET50112445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:54.553402901 CET50112445192.168.2.4150.197.225.1
                              Jan 15, 2025 17:50:54.558052063 CET44550112150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:54.558223963 CET44550112150.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:54.724235058 CET50125445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:54.729139090 CET44550125150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:54.729249001 CET50125445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:54.732232094 CET50125445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:54.734822989 CET50126445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:54.737169027 CET44550125150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:54.737234116 CET50125445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:54.739722013 CET44550126150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:54.739804029 CET50126445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:54.739814043 CET50126445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:54.744672060 CET44550126150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:55.056365013 CET50128445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:55.218700886 CET44550128217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:55.218841076 CET50128445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:55.218946934 CET50128445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:55.223680973 CET44550128217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:56.129466057 CET4455005524.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:56.132492065 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:56.132492065 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:56.132492065 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:56.137377024 CET4455005524.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:56.137387037 CET4455005524.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:56.197074890 CET50132445192.168.2.424.46.238.2
                              Jan 15, 2025 17:50:56.202076912 CET4455013224.46.238.2192.168.2.4
                              Jan 15, 2025 17:50:56.204472065 CET50132445192.168.2.424.46.238.2
                              Jan 15, 2025 17:50:56.204510927 CET50132445192.168.2.424.46.238.2
                              Jan 15, 2025 17:50:56.204840899 CET50133445192.168.2.424.46.238.2
                              Jan 15, 2025 17:50:56.209489107 CET4455013224.46.238.2192.168.2.4
                              Jan 15, 2025 17:50:56.209702969 CET4455013324.46.238.2192.168.2.4
                              Jan 15, 2025 17:50:56.209764957 CET50132445192.168.2.424.46.238.2
                              Jan 15, 2025 17:50:56.209784985 CET50133445192.168.2.424.46.238.2
                              Jan 15, 2025 17:50:56.209826946 CET50133445192.168.2.424.46.238.2
                              Jan 15, 2025 17:50:56.214660883 CET4455013324.46.238.2192.168.2.4
                              Jan 15, 2025 17:50:56.669253111 CET44550126150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:56.669413090 CET50126445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:56.669523954 CET50126445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:56.669631958 CET50126445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:56.674293995 CET44550126150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:56.674463034 CET44550126150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:57.040728092 CET50138445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:57.045681953 CET44550138116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:57.045777082 CET50138445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:57.045826912 CET50138445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:57.050724030 CET44550138116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:59.681329012 CET50166445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:59.686084032 CET44550166150.197.225.2192.168.2.4
                              Jan 15, 2025 17:50:59.686206102 CET50166445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:59.686275005 CET50166445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:50:59.691040039 CET44550166150.197.225.2192.168.2.4
                              Jan 15, 2025 17:51:00.164609909 CET4455006124.145.216.1192.168.2.4
                              Jan 15, 2025 17:51:00.164731026 CET50061445192.168.2.424.145.216.1
                              Jan 15, 2025 17:51:00.164757967 CET50061445192.168.2.424.145.216.1
                              Jan 15, 2025 17:51:00.164793968 CET50061445192.168.2.424.145.216.1
                              Jan 15, 2025 17:51:00.169650078 CET4455006124.145.216.1192.168.2.4
                              Jan 15, 2025 17:51:00.169693947 CET4455006124.145.216.1192.168.2.4
                              Jan 15, 2025 17:51:00.223344088 CET44550062205.202.215.1192.168.2.4
                              Jan 15, 2025 17:51:00.223443031 CET50062445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:51:00.223504066 CET50062445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:51:00.223553896 CET50062445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:51:00.228471041 CET44550062205.202.215.1192.168.2.4
                              Jan 15, 2025 17:51:00.228503942 CET44550062205.202.215.1192.168.2.4
                              Jan 15, 2025 17:51:00.293591022 CET50175445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:00.298973083 CET44550175205.202.215.2192.168.2.4
                              Jan 15, 2025 17:51:00.299128056 CET50175445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:00.299269915 CET50175445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:00.299690008 CET50176445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:00.304919004 CET44550176205.202.215.2192.168.2.4
                              Jan 15, 2025 17:51:00.305068016 CET50176445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:00.305068016 CET50176445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:00.305077076 CET44550175205.202.215.2192.168.2.4
                              Jan 15, 2025 17:51:00.305129051 CET50175445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:00.310255051 CET44550176205.202.215.2192.168.2.4
                              Jan 15, 2025 17:51:01.622066975 CET44550166150.197.225.2192.168.2.4
                              Jan 15, 2025 17:51:01.622159004 CET50166445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:51:01.622204065 CET50166445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:51:01.622236013 CET50166445192.168.2.4150.197.225.2
                              Jan 15, 2025 17:51:01.627057076 CET44550166150.197.225.2192.168.2.4
                              Jan 15, 2025 17:51:01.627073050 CET44550166150.197.225.2192.168.2.4
                              Jan 15, 2025 17:51:01.674658060 CET44550066133.105.26.1192.168.2.4
                              Jan 15, 2025 17:51:01.674724102 CET50066445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:51:01.674755096 CET50066445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:51:01.674813986 CET50066445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:51:01.679658890 CET44550066133.105.26.1192.168.2.4
                              Jan 15, 2025 17:51:01.679688931 CET44550066133.105.26.1192.168.2.4
                              Jan 15, 2025 17:51:01.681389093 CET50199445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:01.686275005 CET44550199150.197.225.3192.168.2.4
                              Jan 15, 2025 17:51:01.686356068 CET50199445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:01.686398029 CET50199445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:01.686688900 CET50200445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:01.691462040 CET44550199150.197.225.3192.168.2.4
                              Jan 15, 2025 17:51:01.691514969 CET44550200150.197.225.3192.168.2.4
                              Jan 15, 2025 17:51:01.691523075 CET50199445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:01.691574097 CET50200445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:01.691607952 CET50200445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:01.696378946 CET44550200150.197.225.3192.168.2.4
                              Jan 15, 2025 17:51:02.305295944 CET44550067163.210.141.1192.168.2.4
                              Jan 15, 2025 17:51:02.305469990 CET50067445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:51:02.305469990 CET50067445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:51:02.305469990 CET50067445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:51:02.310415030 CET44550067163.210.141.1192.168.2.4
                              Jan 15, 2025 17:51:02.310446024 CET44550067163.210.141.1192.168.2.4
                              Jan 15, 2025 17:51:02.369016886 CET50217445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:02.373975039 CET44550217163.210.141.2192.168.2.4
                              Jan 15, 2025 17:51:02.374053955 CET50217445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:02.374149084 CET50217445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:02.374562025 CET50218445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:02.379057884 CET44550217163.210.141.2192.168.2.4
                              Jan 15, 2025 17:51:02.379445076 CET44550218163.210.141.2192.168.2.4
                              Jan 15, 2025 17:51:02.379508972 CET50218445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:02.379539013 CET50218445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:02.380948067 CET44550217163.210.141.2192.168.2.4
                              Jan 15, 2025 17:51:02.381012917 CET50217445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:02.384352922 CET44550218163.210.141.2192.168.2.4
                              Jan 15, 2025 17:51:03.165764093 CET50238445192.168.2.424.145.216.1
                              Jan 15, 2025 17:51:03.170818090 CET4455023824.145.216.1192.168.2.4
                              Jan 15, 2025 17:51:03.170944929 CET50238445192.168.2.424.145.216.1
                              Jan 15, 2025 17:51:03.170974970 CET50238445192.168.2.424.145.216.1
                              Jan 15, 2025 17:51:03.175858021 CET4455023824.145.216.1192.168.2.4
                              Jan 15, 2025 17:51:03.615987062 CET4455007168.209.105.1192.168.2.4
                              Jan 15, 2025 17:51:03.616101980 CET50071445192.168.2.468.209.105.1
                              Jan 15, 2025 17:51:03.619473934 CET50071445192.168.2.468.209.105.1
                              Jan 15, 2025 17:51:03.619473934 CET50071445192.168.2.468.209.105.1
                              Jan 15, 2025 17:51:03.623944998 CET44550200150.197.225.3192.168.2.4
                              Jan 15, 2025 17:51:03.624020100 CET50200445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:03.624284983 CET4455007168.209.105.1192.168.2.4
                              Jan 15, 2025 17:51:03.624294996 CET4455007168.209.105.1192.168.2.4
                              Jan 15, 2025 17:51:03.627064943 CET50200445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:03.627099991 CET50200445192.168.2.4150.197.225.3
                              Jan 15, 2025 17:51:03.631915092 CET44550200150.197.225.3192.168.2.4
                              Jan 15, 2025 17:51:03.631928921 CET44550200150.197.225.3192.168.2.4
                              Jan 15, 2025 17:51:03.831662893 CET4455007349.0.35.2192.168.2.4
                              Jan 15, 2025 17:51:03.831726074 CET50073445192.168.2.449.0.35.2
                              Jan 15, 2025 17:51:03.831882954 CET50073445192.168.2.449.0.35.2
                              Jan 15, 2025 17:51:03.831918955 CET50073445192.168.2.449.0.35.2
                              Jan 15, 2025 17:51:03.836735010 CET4455007349.0.35.2192.168.2.4
                              Jan 15, 2025 17:51:03.836746931 CET4455007349.0.35.2192.168.2.4
                              Jan 15, 2025 17:51:04.348339081 CET44550074138.98.68.1192.168.2.4
                              Jan 15, 2025 17:51:04.348429918 CET50074445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:51:04.348473072 CET50074445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:51:04.348515987 CET50074445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:51:04.353307962 CET44550074138.98.68.1192.168.2.4
                              Jan 15, 2025 17:51:04.353317976 CET44550074138.98.68.1192.168.2.4
                              Jan 15, 2025 17:51:04.377793074 CET4455007668.224.30.2192.168.2.4
                              Jan 15, 2025 17:51:04.377867937 CET50076445192.168.2.468.224.30.2
                              Jan 15, 2025 17:51:04.377897978 CET50076445192.168.2.468.224.30.2
                              Jan 15, 2025 17:51:04.377937078 CET50076445192.168.2.468.224.30.2
                              Jan 15, 2025 17:51:04.382790089 CET4455007668.224.30.2192.168.2.4
                              Jan 15, 2025 17:51:04.382802010 CET4455007668.224.30.2192.168.2.4
                              Jan 15, 2025 17:51:04.407042980 CET50277445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:04.411886930 CET44550277138.98.68.2192.168.2.4
                              Jan 15, 2025 17:51:04.413929939 CET50277445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:04.414030075 CET50277445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:04.418992996 CET44550277138.98.68.2192.168.2.4
                              Jan 15, 2025 17:51:04.428380966 CET50278445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:04.433161020 CET44550278138.98.68.2192.168.2.4
                              Jan 15, 2025 17:51:04.435992002 CET50278445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:04.436016083 CET50278445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:04.440805912 CET44550278138.98.68.2192.168.2.4
                              Jan 15, 2025 17:51:04.451663017 CET44550277138.98.68.2192.168.2.4
                              Jan 15, 2025 17:51:04.452425957 CET50277445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:04.681302071 CET50289445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:51:04.686191082 CET44550289133.105.26.1192.168.2.4
                              Jan 15, 2025 17:51:04.688432932 CET50289445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:51:04.688457012 CET50289445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:51:04.693242073 CET44550289133.105.26.1192.168.2.4
                              Jan 15, 2025 17:51:04.830409050 CET4455007783.215.79.2192.168.2.4
                              Jan 15, 2025 17:51:04.833956957 CET50077445192.168.2.483.215.79.2
                              Jan 15, 2025 17:51:04.834059954 CET50077445192.168.2.483.215.79.2
                              Jan 15, 2025 17:51:04.834131956 CET50077445192.168.2.483.215.79.2
                              Jan 15, 2025 17:51:04.838850021 CET4455007783.215.79.2192.168.2.4
                              Jan 15, 2025 17:51:04.838860989 CET4455007783.215.79.2192.168.2.4
                              Jan 15, 2025 17:51:04.900458097 CET50302445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:04.905359983 CET4455030283.215.79.3192.168.2.4
                              Jan 15, 2025 17:51:04.905941010 CET50302445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:04.906024933 CET50302445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:04.906538963 CET50303445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:04.911075115 CET4455030283.215.79.3192.168.2.4
                              Jan 15, 2025 17:51:04.911158085 CET4455030283.215.79.3192.168.2.4
                              Jan 15, 2025 17:51:04.911223888 CET50302445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:04.911407948 CET4455030383.215.79.3192.168.2.4
                              Jan 15, 2025 17:51:04.913938046 CET50303445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:04.913974047 CET50303445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:04.918879032 CET4455030383.215.79.3192.168.2.4
                              Jan 15, 2025 17:51:04.989857912 CET44550080121.43.141.1192.168.2.4
                              Jan 15, 2025 17:51:04.993992090 CET50080445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:51:04.994077921 CET50080445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:51:04.994132042 CET50080445192.168.2.4121.43.141.1
                              Jan 15, 2025 17:51:04.999085903 CET44550080121.43.141.1192.168.2.4
                              Jan 15, 2025 17:51:04.999100924 CET44550080121.43.141.1192.168.2.4
                              Jan 15, 2025 17:51:06.355086088 CET4455008187.197.225.1192.168.2.4
                              Jan 15, 2025 17:51:06.355149031 CET50081445192.168.2.487.197.225.1
                              Jan 15, 2025 17:51:06.502830982 CET4455008492.159.65.1192.168.2.4
                              Jan 15, 2025 17:51:06.502922058 CET50084445192.168.2.492.159.65.1
                              Jan 15, 2025 17:51:07.805288076 CET4455008757.181.230.1192.168.2.4
                              Jan 15, 2025 17:51:07.805365086 CET50087445192.168.2.457.181.230.1
                              Jan 15, 2025 17:51:08.299779892 CET44550088184.51.220.1192.168.2.4
                              Jan 15, 2025 17:51:08.299840927 CET50088445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:51:08.339219093 CET50093445192.168.2.4223.189.178.2
                              Jan 15, 2025 17:51:08.339272022 CET50088445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:51:08.339401960 CET50105445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:51:08.339490891 CET50111445192.168.2.470.146.33.2
                              Jan 15, 2025 17:51:08.339508057 CET50121445192.168.2.4164.183.20.2
                              Jan 15, 2025 17:51:08.339540005 CET50218445192.168.2.4163.210.141.2
                              Jan 15, 2025 17:51:08.339560032 CET50176445192.168.2.4205.202.215.2
                              Jan 15, 2025 17:51:08.339571953 CET50084445192.168.2.492.159.65.1
                              Jan 15, 2025 17:51:08.339641094 CET50102445192.168.2.4107.136.9.2
                              Jan 15, 2025 17:51:08.339668989 CET50087445192.168.2.457.181.230.1
                              Jan 15, 2025 17:51:08.339699984 CET50081445192.168.2.487.197.225.1
                              Jan 15, 2025 17:51:08.339726925 CET50289445192.168.2.4133.105.26.1
                              Jan 15, 2025 17:51:08.339771986 CET50096445192.168.2.480.25.124.1
                              Jan 15, 2025 17:51:08.339804888 CET50097445192.168.2.478.237.131.1
                              Jan 15, 2025 17:51:08.339838982 CET50100445192.168.2.439.154.148.1
                              Jan 15, 2025 17:51:08.339874983 CET50106445192.168.2.421.144.68.1
                              Jan 15, 2025 17:51:08.339900017 CET50109445192.168.2.4106.230.138.1
                              Jan 15, 2025 17:51:08.339968920 CET50116445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:51:08.339975119 CET50115445192.168.2.4200.9.23.1
                              Jan 15, 2025 17:51:08.340061903 CET50119445192.168.2.4209.56.1.1
                              Jan 15, 2025 17:51:08.340096951 CET50124445192.168.2.468.29.208.1
                              Jan 15, 2025 17:51:08.340121031 CET50128445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:51:08.340146065 CET50133445192.168.2.424.46.238.2
                              Jan 15, 2025 17:51:08.340167999 CET50138445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:51:08.340298891 CET50238445192.168.2.424.145.216.1
                              Jan 15, 2025 17:51:08.340394020 CET50278445192.168.2.4138.98.68.2
                              Jan 15, 2025 17:51:08.340508938 CET50303445192.168.2.483.215.79.3
                              Jan 15, 2025 17:51:09.181324959 CET4972380192.168.2.42.22.50.131
                              Jan 15, 2025 17:51:09.181464911 CET4972480192.168.2.42.22.50.131
                              Jan 15, 2025 17:51:09.186438084 CET80497232.22.50.131192.168.2.4
                              Jan 15, 2025 17:51:09.186506987 CET4972380192.168.2.42.22.50.131
                              Jan 15, 2025 17:51:09.186898947 CET80497242.22.50.131192.168.2.4
                              Jan 15, 2025 17:51:09.186959028 CET4972480192.168.2.42.22.50.131
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 15, 2025 17:50:01.018671036 CET5626153192.168.2.41.1.1.1
                              Jan 15, 2025 17:50:01.031138897 CET53562611.1.1.1192.168.2.4
                              Jan 15, 2025 17:50:20.808612108 CET138138192.168.2.4192.168.2.255
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 15, 2025 17:50:01.018671036 CET192.168.2.41.1.1.10x3a37Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 15, 2025 17:50:01.031138897 CET1.1.1.1192.168.2.40x3a37No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                              Jan 15, 2025 17:50:01.031138897 CET1.1.1.1192.168.2.40x3a37No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                              • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449730104.16.167.228807560C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 15, 2025 17:50:01.041515112 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 15, 2025 17:50:01.512963057 CET778INHTTP/1.1 200 OK
                              Date: Wed, 15 Jan 2025 16:50:01 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90275cc70a8232d9-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.449731104.16.167.228807604C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 15, 2025 17:50:01.760481119 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 15, 2025 17:50:02.251010895 CET778INHTTP/1.1 200 OK
                              Date: Wed, 15 Jan 2025 16:50:02 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90275ccb9d690f71-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.449750104.16.167.228807792C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 15, 2025 17:50:03.835784912 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 15, 2025 17:50:04.837662935 CET778INHTTP/1.1 200 OK
                              Date: Wed, 15 Jan 2025 16:50:04 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90275cd89dd17c94-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                              Jan 15, 2025 17:50:04.837713003 CET778INHTTP/1.1 200 OK
                              Date: Wed, 15 Jan 2025 16:50:04 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 90275cd89dd17c94-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:11:49:59
                              Start date:15/01/2025
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll"
                              Imagebase:0xa90000
                              File size:126'464 bytes
                              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:1
                              Start time:11:49:59
                              Start date:15/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:11:49:59
                              Start date:15/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:11:49:59
                              Start date:15/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGame
                              Imagebase:0x4c0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:11:49:59
                              Start date:15/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1
                              Imagebase:0x4c0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:11:49:59
                              Start date:15/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:F94040A4F1B7430DA9CB70BFA8B8B4D9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1686586617.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:6
                              Start time:11:50:00
                              Start date:15/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe -m security
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:F94040A4F1B7430DA9CB70BFA8B8B4D9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1694602947.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:11:50:01
                              Start date:15/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:9CACE6E7D4EA5A7A5EC8F43B950B6A94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.1703594047.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 98%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:8
                              Start time:11:50:02
                              Start date:15/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",PlayGame
                              Imagebase:0x4c0000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:9
                              Start time:11:50:02
                              Start date:15/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:F94040A4F1B7430DA9CB70BFA8B8B4D9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1728446272.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1714967200.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:10
                              Start time:11:50:03
                              Start date:15/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:9CACE6E7D4EA5A7A5EC8F43B950B6A94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1728045556.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:71.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:64.9%
                                Total number of Nodes:37
                                Total number of Limit Nodes:9

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                • CreateProcessA.KERNELBASE ref: 00407EE8
                                • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1712882226.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1712862157.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713030112.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713314945.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4281112323-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1712882226.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1712862157.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713030112.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713314945.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000005.00000002.1712882226.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1712862157.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713030112.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713314945.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1712882226.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1712862157.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713030112.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713314945.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.1712882226.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.1712862157.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713030112.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713314945.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Execution Graph

                                Execution Coverage:34.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:35
                                Total number of Limit Nodes:2

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2341159218.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2341144727.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341175357.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341237518.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341252338.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000006.00000002.2341159218.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2341144727.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341175357.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341237518.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341252338.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2341159218.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2341144727.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341175357.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341237518.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341252338.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.2341159218.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2341144727.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341175357.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341237518.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341252338.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4072214828-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000006.00000002.2341159218.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.2341144727.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341175357.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341189546.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341237518.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341252338.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                APIs
                                • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID: /../$/..\$\../$\..\
                                • API String ID: 3510742995-3885502717
                                • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                • API String ID: 2238633743-2459060434
                                • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$ManagerStart
                                • String ID: cmd.exe /c "%s"
                                • API String ID: 1485051382-955883872
                                • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow$memcpy
                                • String ID:
                                • API String ID: 1881450474-3916222277
                                • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                • String ID: WANACRY!
                                • API String ID: 283026544-1240840912
                                • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID: $Q;@
                                • API String ID: 2382887404-262343263
                                • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-3916222277
                                • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                APIs
                                • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$FreeProcessfree
                                • String ID:
                                • API String ID: 3428986607-0
                                • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                APIs
                                • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ContextCryptRelease
                                • String ID:
                                • API String ID: 829835001-0
                                • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                APIs
                                  • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                • API String ID: 2238633743-1294736154
                                • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: %s%s$%s%s%s$:$\
                                • API String ID: 0-1100577047
                                • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                APIs
                                • __p___argv.MSVCRT(0040F538), ref: 00402040
                                • strcmp.MSVCRT(?), ref: 0040204B
                                • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                  • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                  • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                  • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                  • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                  • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                • API String ID: 1074704982-2844324180
                                • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                APIs
                                • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                • strlen.MSVCRT(?), ref: 004011A7
                                • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                • String ID: 0@$Software\$WanaCrypt0r
                                • API String ID: 865909632-3421300005
                                • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                • String ID: %s\Intel$%s\ProgramData
                                • API String ID: 3806094219-198707228
                                • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                APIs
                                  • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                  • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                • SetLastError.KERNEL32(0000045A), ref: 00402430
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                • API String ID: 1900561814-3657104962
                                • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                APIs
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                • String ID: %s\%s
                                • API String ID: 1036847564-4073750446
                                • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                APIs
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                • CloseHandle.KERNEL32(?), ref: 004010EC
                                • CloseHandle.KERNEL32(?), ref: 004010F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                • String ID: D
                                • API String ID: 786732093-2746444292
                                • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                APIs
                                • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                • __p__fmode.MSVCRT ref: 004077FC
                                • __p__commode.MSVCRT ref: 0040780A
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                • String ID:
                                • API String ID: 3626615345-0
                                • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                APIs
                                • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                  • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                • String ID:
                                • API String ID: 2141228402-0
                                • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                APIs
                                • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Read$realloc
                                • String ID: ?!@
                                • API String ID: 1241503663-708128716
                                • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: rand$wcslen$ComputerNamesrand
                                • String ID:
                                • API String ID: 3058258771-0
                                • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                APIs
                                • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                • String ID:
                                • API String ID: 2935503933-0
                                • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                APIs
                                • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                • Sleep.KERNEL32(000003E8), ref: 00401F40
                                • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandleMutexOpenSleepsprintf
                                • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                • API String ID: 2780352083-2959021817
                                • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-0
                                • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                APIs
                                • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                • fclose.MSVCRT(00000000), ref: 00401058
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: fclosefopenfreadfwrite
                                • String ID: c.wnry
                                • API String ID: 4000964834-3240288721
                                • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                • String ID:
                                • API String ID: 2811923685-0
                                • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                APIs
                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Pointer$??2@Create
                                • String ID:
                                • API String ID: 1331958074-0
                                • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                APIs
                                • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_stricmp
                                • String ID: P!@
                                • API String ID: 1278613211-1774101457
                                • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                APIs
                                • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFilestrcmp
                                • String ID: c.wnry
                                • API String ID: 3324900478-3240288721
                                • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                APIs
                                • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                Strings
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??3@CloseHandle
                                • String ID: $l@
                                • API String ID: 3816424416-2140230165
                                • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                APIs
                                • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                Memory Dump Source
                                • Source File: 00000007.00000002.1709630039.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000007.00000002.1709509293.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710086979.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000007.00000002.1710180656.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$Leave$Entermemcpy
                                • String ID:
                                • API String ID: 3435569088-0
                                • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65