Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ET6LdJaK54.dll

Overview

General Information

Sample name:ET6LdJaK54.dll
renamed because original name is a hash value
Original sample name:ef894d1c6dd120fad5a885bc737d6338.dll
Analysis ID:1592053
MD5:ef894d1c6dd120fad5a885bc737d6338
SHA1:5a0b060469b3d9a0ae8b46969e5a92cf7cbcb909
SHA256:7f45d112de4bb9aec75ce9e2f22997d10d383fc82c357d1c1f97ea5a10132663
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7460 cmdline: loaddll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7512 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7536 cmdline: rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7560 cmdline: C:\WINDOWS\mssecsvc.exe MD5: F94040A4F1B7430DA9CB70BFA8B8B4D9)
          • tasksche.exe (PID: 7676 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 9CACE6E7D4EA5A7A5EC8F43B950B6A94)
    • rundll32.exe (PID: 7520 cmdline: rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7772 cmdline: rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7792 cmdline: C:\WINDOWS\mssecsvc.exe MD5: F94040A4F1B7430DA9CB70BFA8B8B4D9)
        • tasksche.exe (PID: 7880 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 9CACE6E7D4EA5A7A5EC8F43B950B6A94)
  • mssecsvc.exe (PID: 7604 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: F94040A4F1B7430DA9CB70BFA8B8B4D9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ET6LdJaK54.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    ET6LdJaK54.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    ET6LdJaK54.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000005.00000000.1686586617.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        0000000A.00000002.1728045556.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          6.2.mssecsvc.exe.239b8c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          6.2.mssecsvc.exe.1e69084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          6.0.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            6.0.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0xf4d8:$x3: tasksche.exe
            • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0xf52c:$x5: WNcry@2ol7
            • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0xf42c:$s3: cmd.exe /c "%s"
            • 0x41980:$s4: msg/m_portuguese.wnry
            • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            6.0.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            Click to see the 135 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.519492+010020315153Misc activity104.16.167.22880192.168.2.449730TCP
            2025-01-15T17:50:02.252214+010020315153Misc activity104.16.167.22880192.168.2.449731TCP
            2025-01-15T17:50:04.845918+010020315153Misc activity104.16.167.22880192.168.2.449750TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.018671+010020242911A Network Trojan was detected192.168.2.4562611.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020242981A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020242981A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020242981A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020242991A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020242991A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020242991A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020243011A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020243011A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020243011A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010020243021A Network Trojan was detected192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010020243021A Network Trojan was detected192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010020243021A Network Trojan was detected192.168.2.449750104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T17:50:01.514490+010028033043Unknown Traffic192.168.2.449730104.16.167.22880TCP
            2025-01-15T17:50:02.251157+010028033043Unknown Traffic192.168.2.449731104.16.167.22880TCP
            2025-01-15T17:50:04.837718+010028033043Unknown Traffic192.168.2.449750104.16.167.22880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ET6LdJaK54.dllAvira: detected
            Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 97%
            Source: C:\Windows\tasksche.exeReversingLabs: Detection: 97%
            Source: ET6LdJaK54.dllReversingLabs: Detection: 94%
            Source: ET6LdJaK54.dllVirustotal: Detection: 93%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability
            Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
            Source: ET6LdJaK54.dllJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeCode function: 7_2_004018B9 CryptReleaseContext,7_2_004018B9

            Exploits

            barindex
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: ET6LdJaK54.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: Binary string: ole32.pdbdCompareExchange64 source: ET6LdJaK54.dll, tasksche.exe.5.dr
            Source: Binary string: ole32.pdb source: ET6LdJaK54.dll, tasksche.exe.5.dr

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:01 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275cc70a8232d9-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:02 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275ccb9d690f71-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:04 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275cd89dd17c94-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Jan 2025 16:50:04 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90275cd89dd17c94-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: unknownNetwork traffic detected: IP country count 10
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.4:56261 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49750 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49731 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49731
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49750
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.4:49730
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.26
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 223.189.178.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.230
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 107.136.9.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.215
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 70.146.33.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.95
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 164.183.20.1
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.1
            Source: unknownTCP traffic detected without corresponding DNS query: 24.46.238.83
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: ET6LdJaK54.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: mssecsvc.exe, 00000005.00000002.1713856474.0000000000D70000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
            Source: mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/(3
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/L
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/YCN
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9B
            Source: mssecsvc.exe, 00000006.00000002.2341094885.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
            Source: mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comiA
            Source: mssecsvc.exe, 00000009.00000002.1729269917.0000000000B04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!7_2_004014A6
            Source: Yara matchFile source: ET6LdJaK54.dll, type: SAMPLE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000000.1686586617.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2341224146.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1728446272.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1694602947.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1714967200.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1713090731.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7560, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7604, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7792, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

            System Summary

            barindex
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.239b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e69084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000A.00000002.1728045556.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000000.1703594047.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeCode function: 7_2_00406C407_2_00406C40
            Source: C:\Windows\tasksche.exeCode function: 7_2_00402A767_2_00402A76
            Source: C:\Windows\tasksche.exeCode function: 7_2_00402E7E7_2_00402E7E
            Source: C:\Windows\tasksche.exeCode function: 7_2_0040350F7_2_0040350F
            Source: C:\Windows\tasksche.exeCode function: 7_2_00404C197_2_00404C19
            Source: C:\Windows\tasksche.exeCode function: 7_2_0040541F7_2_0040541F
            Source: C:\Windows\tasksche.exeCode function: 7_2_004037977_2_00403797
            Source: C:\Windows\tasksche.exeCode function: 7_2_004043B77_2_004043B7
            Source: C:\Windows\tasksche.exeCode function: 7_2_004031BC7_2_004031BC
            Source: tasksche.exe.5.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
            Source: ET6LdJaK54.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: ET6LdJaK54.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.239b8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e69084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.1e78104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e740a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23cd96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 10.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23cd96c.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e9b128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e9b128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.23aa948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.239b8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.1e69084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.1e78104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23aa948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.23a68e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000A.00000002.1728045556.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000000.1703594047.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000002.1713422130.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000002.1728599696.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2342094636.0000000001E78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000000.1715294375.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2341341531.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000005.00000000.1686721857.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000000.1694846214.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2347378934.00000000023AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: tasksche.exe, 00000007.00000002.1710158629.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000A.00000000.1727695977.000000000040E000.00000008.00000001.01000000.00000007.sdmp, ET6LdJaK54.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
            Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00401CE8
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
            Source: ET6LdJaK54.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGame
            Source: ET6LdJaK54.dllReversingLabs: Detection: 94%
            Source: ET6LdJaK54.dllVirustotal: Detection: 93%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGame
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",PlayGame
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ET6LdJaK54.dll,PlayGameJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",PlayGameJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: ET6LdJaK54.dllStatic file information: File size 5267459 > 1048576
            Source: ET6LdJaK54.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
            Source: Binary string: ole32.pdbdCompareExchange64 source: ET6LdJaK54.dll, tasksche.exe.5.dr
            Source: Binary string: ole32.pdb source: ET6LdJaK54.dll, tasksche.exe.5.dr
            Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 7_2_00407710 push eax; ret 7_2_0040773E
            Source: C:\Windows\tasksche.exeCode function: 7_2_004076C8 push eax; ret 7_2_004076E6

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7648Thread sleep count: 90 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7648Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7652Thread sleep count: 126 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7652Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7648Thread sleep time: -86400000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: mssecsvc.exe, 00000005.00000002.1713856474.0000000000D45000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
            Source: mssecsvc.exe, 00000006.00000003.1701575704.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW\
            Source: mssecsvc.exe, 00000005.00000002.1713856474.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000003.1701575704.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1729269917.0000000000AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\tasksche.exeCode function: 7_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 7_2_004029CC free,GetProcessHeap,HeapFree,7_2_004029CC
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ET6LdJaK54.dll",#1Jump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Service Execution
            4
            Windows Service
            4
            Windows Service
            12
            Masquerading
            OS Credential Dumping1
            Network Share Discovery
            Remote Services1
            Archive Collected Data
            22
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            21
            Virtualization/Sandbox Evasion
            LSASS Memory111
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            11
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDS2
            System Information Discovery
            Distributed Component Object ModelInput Capture3
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Rundll32
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592053 Sample: ET6LdJaK54.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.102 unknown unknown 12->45 47 192.168.2.103 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            ET6LdJaK54.dll95%ReversingLabsWin32.Ransomware.WannaCry
            ET6LdJaK54.dll93%VirustotalBrowse
            ET6LdJaK54.dll100%AviraTR/Ransom.Gen
            ET6LdJaK54.dll100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
            C:\Windows\tasksche.exe100%Joe Sandbox ML
            C:\WINDOWS\qeriuwjhrf (copy)98%ReversingLabsWin32.Ransomware.WannaCry
            C:\Windows\tasksche.exe98%ReversingLabsWin32.Ransomware.WannaCry
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9B0%Avira URL Cloudsafe
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comiA0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            104.16.167.228
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comET6LdJaK54.dllfalse
                  high
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/smssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://www.kryptoslogic.commssecsvc.exe, 00000009.00000002.1729269917.0000000000B04000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Lmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/(3mssecsvc.exe, 00000009.00000002.1729269917.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com9Bmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comiAmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/YCNmssecsvc.exe, 00000006.00000002.2341581947.0000000000BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000006.00000002.2341094885.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              150.197.225.3
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              150.197.225.2
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              68.29.208.213
                              unknownUnited States
                              10507SPCSUSfalse
                              87.197.225.184
                              unknownSlovakia (SLOVAK Republic)
                              6855SK-TELEKOMSKfalse
                              150.197.225.1
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              70.146.33.215
                              unknownUnited States
                              6389BELLSOUTH-NET-BLKUSfalse
                              106.230.138.178
                              unknownChina
                              4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                              57.181.230.1
                              unknownBelgium
                              2686ATGS-MMD-ASUSfalse
                              223.189.178.2
                              unknownIndia
                              45609BHARTI-MOBILITY-AS-APBhartiAirtelLtdASforGPRSServicefalse
                              223.189.178.1
                              unknownIndia
                              45609BHARTI-MOBILITY-AS-APBhartiAirtelLtdASforGPRSServicefalse
                              163.210.141.2
                              unknownJapan2516KDDIKDDICORPORATIONJPfalse
                              163.210.141.1
                              unknownJapan2516KDDIKDDICORPORATIONJPfalse
                              164.183.20.1
                              unknownUnited States
                              37717EL-KhawarizmiTNfalse
                              164.183.20.2
                              unknownUnited States
                              37717EL-KhawarizmiTNfalse
                              138.98.68.169
                              unknownUnited States
                              776FR-INRIA-SOPHIAINRIASophia-AntipolisEUfalse
                              68.209.105.69
                              unknownUnited States
                              7018ATT-INTERNET4USfalse
                              24.46.238.1
                              unknownUnited States
                              6128CABLE-NET-1USfalse
                              217.156.218.50
                              unknownUnited Kingdom
                              3549LVLT-3549USfalse
                              57.181.230.105
                              unknownBelgium
                              2686ATGS-MMD-ASUSfalse
                              24.46.238.2
                              unknownUnited States
                              6128CABLE-NET-1USfalse
                              121.43.141.1
                              unknownChina
                              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                              150.197.225.252
                              unknownKorea Republic of
                              9489KARINET-ASKoreaAerospaceResearchInstituteKRfalse
                              184.51.220.112
                              unknownUnited States
                              16625AKAMAI-ASUSfalse
                              163.210.141.184
                              unknownJapan2516KDDIKDDICORPORATIONJPfalse
                              24.145.216.1
                              unknownUnited States
                              10796TWC-10796-MIDWESTUSfalse
                              184.51.220.1
                              unknownUnited States
                              16625AKAMAI-ASUSfalse
                              92.159.65.1
                              unknownFrance
                              3215FranceTelecom-OrangeFRfalse
                              87.197.225.1
                              unknownSlovakia (SLOVAK Republic)
                              6855SK-TELEKOMSKfalse
                              IP
                              192.168.2.148
                              192.168.2.149
                              192.168.2.146
                              192.168.2.147
                              192.168.2.140
                              192.168.2.141
                              192.168.2.144
                              192.168.2.145
                              192.168.2.142
                              192.168.2.143
                              192.168.2.159
                              192.168.2.157
                              192.168.2.158
                              192.168.2.151
                              192.168.2.152
                              192.168.2.150
                              192.168.2.155
                              192.168.2.156
                              192.168.2.153
                              192.168.2.154
                              192.168.2.126
                              192.168.2.247
                              192.168.2.127
                              192.168.2.248
                              192.168.2.124
                              192.168.2.245
                              192.168.2.125
                              192.168.2.246
                              192.168.2.128
                              192.168.2.249
                              192.168.2.129
                              192.168.2.240
                              192.168.2.122
                              192.168.2.243
                              192.168.2.123
                              192.168.2.244
                              192.168.2.120
                              192.168.2.241
                              192.168.2.121
                              192.168.2.242
                              192.168.2.97
                              192.168.2.137
                              192.168.2.96
                              192.168.2.138
                              192.168.2.99
                              192.168.2.135
                              192.168.2.98
                              192.168.2.136
                              192.168.2.139
                              192.168.2.250
                              192.168.2.130
                              192.168.2.251
                              192.168.2.91
                              192.168.2.90
                              192.168.2.93
                              192.168.2.133
                              192.168.2.254
                              192.168.2.92
                              192.168.2.134
                              192.168.2.95
                              192.168.2.131
                              192.168.2.252
                              192.168.2.94
                              192.168.2.132
                              192.168.2.253
                              192.168.2.104
                              192.168.2.225
                              192.168.2.105
                              192.168.2.226
                              192.168.2.102
                              192.168.2.223
                              192.168.2.103
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1592053
                              Start date and time:2025-01-15 17:49:06 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 4m 42s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:ET6LdJaK54.dll
                              renamed because original name is a hash value
                              Original Sample Name:ef894d1c6dd120fad5a885bc737d6338.dll
                              Detection:MAL
                              Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                              EGA Information:
                              • Successful, ratio: 66.7%
                              HCA Information:Failed
                              Cookbook Comments:
                              • Found application associated with file extension: .dll
                              • Stop behavior analysis, all processes terminated
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 199.232.214.172, 2.23.77.188, 20.12.23.50, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target tasksche.exe, PID 7676 because there are no executed function
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              11:50:02API Interceptor1x Sleep call for process: loaddll32.exe modified
                              11:50:35API Interceptor112x Sleep call for process: mssecsvc.exe modified
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGeW4GzT8G8.dllGet hashmaliciousVirut, WannacryBrowse
                              • 104.16.166.228
                              JRTn7b1kHg.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              alN48K3xcD.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              XB6SkLK7Al.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              KARINET-ASKoreaAerospaceResearchInstituteKRfrosty.sh4.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.150
                              nklsh4.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.146
                              mips.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.136
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.118.211
                              rebirth.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                              • 150.197.75.138
                              jew.arm6.elfGet hashmaliciousUnknownBrowse
                              • 150.197.254.148
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.129
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.149
                              la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.143
                              c0A15kui8k.elfGet hashmaliciousMirai, MoobotBrowse
                              • 150.197.118.234
                              SPCSUSGn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                              • 184.229.205.229
                              zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                              • 108.104.123.1
                              bot.arm5.elfGet hashmaliciousUnknownBrowse
                              • 108.121.222.207
                              bot.mips.elfGet hashmaliciousUnknownBrowse
                              • 184.216.124.83
                              bot.arm.elfGet hashmaliciousUnknownBrowse
                              • 184.238.141.135
                              i686.elfGet hashmaliciousMiraiBrowse
                              • 173.149.249.224
                              xd.arm.elfGet hashmaliciousMiraiBrowse
                              • 70.1.208.36
                              xd.ppc.elfGet hashmaliciousMiraiBrowse
                              • 108.123.155.22
                              xd.mpsl.elfGet hashmaliciousMiraiBrowse
                              • 173.146.133.53
                              spc.elfGet hashmaliciousMiraiBrowse
                              • 174.153.208.25
                              KARINET-ASKoreaAerospaceResearchInstituteKRfrosty.sh4.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.150
                              nklsh4.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.146
                              mips.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.136
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.118.211
                              rebirth.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                              • 150.197.75.138
                              jew.arm6.elfGet hashmaliciousUnknownBrowse
                              • 150.197.254.148
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.129
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 150.197.75.149
                              la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                              • 150.197.75.143
                              c0A15kui8k.elfGet hashmaliciousMirai, MoobotBrowse
                              • 150.197.118.234
                              SK-TELEKOMSK5.elfGet hashmaliciousUnknownBrowse
                              • 91.127.4.171
                              fuckunix.spc.elfGet hashmaliciousMiraiBrowse
                              • 78.98.93.67
                              nklarm7.elfGet hashmaliciousUnknownBrowse
                              • 213.81.148.95
                              armv4l.elfGet hashmaliciousUnknownBrowse
                              • 213.81.214.137
                              armv7l.elfGet hashmaliciousUnknownBrowse
                              • 78.98.93.60
                              sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 95.102.171.247
                              la.bot.arm.elfGet hashmaliciousMiraiBrowse
                              • 95.102.64.117
                              nshkarm5.elfGet hashmaliciousMiraiBrowse
                              • 78.98.240.177
                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                              • 178.40.197.96
                              arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 193.179.46.12
                              No context
                              No context
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.989728510050888
                              Encrypted:false
                              SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2gCK:QqPe1Cxcxk3ZAEUadzR8yc42
                              MD5:9CACE6E7D4EA5A7A5EC8F43B950B6A94
                              SHA1:943D612A6CD432D5D728B40646DCBE5AEF34F035
                              SHA-256:B0F6A5CE8795C8DD770E2D05CE987439FC1D281E0A113711AD17D9788753C2EC
                              SHA-512:AD061F264A244091DADDB297B3FE5DAFFC8A845E01630D9C7FEC99679A02F7634ED6E9E72C944E49F8EF3AB3E35C68AFDA5783FFF815F4EB0321542224D57C6A
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 98%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):7.989728510050888
                              Encrypted:false
                              SSDEEP:98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2gCK:QqPe1Cxcxk3ZAEUadzR8yc42
                              MD5:9CACE6E7D4EA5A7A5EC8F43B950B6A94
                              SHA1:943D612A6CD432D5D728B40646DCBE5AEF34F035
                              SHA-256:B0F6A5CE8795C8DD770E2D05CE987439FC1D281E0A113711AD17D9788753C2EC
                              SHA-512:AD061F264A244091DADDB297B3FE5DAFFC8A845E01630D9C7FEC99679A02F7634ED6E9E72C944E49F8EF3AB3E35C68AFDA5783FFF815F4EB0321542224D57C6A
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 98%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.3973428538368005
                              TrID:
                              • Win32 Dynamic Link Library (generic) (1002004/3) 98.32%
                              • Windows Screen Saver (13104/52) 1.29%
                              • Generic Win/DOS Executable (2004/3) 0.20%
                              • DOS Executable Generic (2002/1) 0.20%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:ET6LdJaK54.dll
                              File size:5'267'459 bytes
                              MD5:ef894d1c6dd120fad5a885bc737d6338
                              SHA1:5a0b060469b3d9a0ae8b46969e5a92cf7cbcb909
                              SHA256:7f45d112de4bb9aec75ce9e2f22997d10d383fc82c357d1c1f97ea5a10132663
                              SHA512:fd5b844dbf51814963bfb6f307029fc1fbebd58f1eb5ac782d5fcfd99f5e26a1e1bfc44d9027b9d44ea407541a96ed0752d03437c1b912a850ad23831a330c13
                              SSDEEP:98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2gC:+DqPe1Cxcxk3ZAEUadzR8yc4
                              TLSH:F1363360F156E1B8D0112AB0047AA537D2F6BC391A7E6A0F4B40CA7B1E52BB7DF54E07
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                              Icon Hash:7ae282899bbab082
                              Entrypoint:0x100011e9
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x10000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                              DLL Characteristics:
                              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                              Instruction
                              push ebp
                              mov ebp, esp
                              push ebx
                              mov ebx, dword ptr [ebp+08h]
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              push edi
                              mov edi, dword ptr [ebp+10h]
                              test esi, esi
                              jne 00007F64487DD46Bh
                              cmp dword ptr [10003140h], 00000000h
                              jmp 00007F64487DD488h
                              cmp esi, 01h
                              je 00007F64487DD467h
                              cmp esi, 02h
                              jne 00007F64487DD484h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F64487DD46Bh
                              push edi
                              push esi
                              push ebx
                              call eax
                              test eax, eax
                              je 00007F64487DD46Eh
                              push edi
                              push esi
                              push ebx
                              call 00007F64487DD37Ah
                              test eax, eax
                              jne 00007F64487DD466h
                              xor eax, eax
                              jmp 00007F64487DD4B0h
                              push edi
                              push esi
                              push ebx
                              call 00007F64487DD22Ch
                              cmp esi, 01h
                              mov dword ptr [ebp+0Ch], eax
                              jne 00007F64487DD46Eh
                              test eax, eax
                              jne 00007F64487DD499h
                              push edi
                              push eax
                              push ebx
                              call 00007F64487DD356h
                              test esi, esi
                              je 00007F64487DD467h
                              cmp esi, 03h
                              jne 00007F64487DD488h
                              push edi
                              push esi
                              push ebx
                              call 00007F64487DD345h
                              test eax, eax
                              jne 00007F64487DD465h
                              and dword ptr [ebp+0Ch], eax
                              cmp dword ptr [ebp+0Ch], 00000000h
                              je 00007F64487DD473h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F64487DD46Ah
                              push edi
                              push esi
                              push ebx
                              call eax
                              mov dword ptr [ebp+0Ch], eax
                              mov eax, dword ptr [ebp+0Ch]
                              pop edi
                              pop esi
                              pop ebx
                              pop ebp
                              retn 000Ch
                              jmp dword ptr [10002028h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              Programming Language:
                              • [ C ] VS98 (6.0) build 8168
                              • [C++] VS98 (6.0) build 8168
                              • [RES] VS98 (6.0) cvtres build 1720
                              • [LNK] VS98 (6.0) imp/exp build 8168
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x40000x5000600x501000c09b0dc129ef5d2d2e3709117e541661unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              W0x40600x500000dataEnglishUnited States0.8770942687988281
                              DLLImport
                              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                              NameOrdinalAddress
                              PlayGame10x10001114
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-15T17:50:01.018671+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.4562611.1.1.153UDP
                              2025-01-15T17:50:01.514490+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.514490+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449730104.16.167.22880TCP
                              2025-01-15T17:50:01.519492+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449730TCP
                              2025-01-15T17:50:02.251157+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.251157+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449731104.16.167.22880TCP
                              2025-01-15T17:50:02.252214+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449731TCP
                              2025-01-15T17:50:04.837718+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.837718+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.449750104.16.167.22880TCP
                              2025-01-15T17:50:04.845918+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.449750TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 15, 2025 17:50:01.036472082 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.041316986 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.041392088 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.041515112 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.046251059 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.512963057 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.514344931 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.514489889 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.514683008 CET4973080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.519491911 CET8049730104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.754759073 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.759751081 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:01.760373116 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.760481119 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:01.765300035 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.251010895 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.251157045 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:02.251306057 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:02.252213955 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.252268076 CET4973180192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:02.256052017 CET8049731104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:02.368428946 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.373322010 CET44549732223.189.178.26192.168.2.4
                              Jan 15, 2025 17:50:02.373410940 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.374802113 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.375097990 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.379596949 CET44549732223.189.178.26192.168.2.4
                              Jan 15, 2025 17:50:02.379662037 CET49732445192.168.2.4223.189.178.26
                              Jan 15, 2025 17:50:02.379893064 CET44549733223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:02.379967928 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.380151033 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.384449959 CET49675443192.168.2.4173.222.162.32
                              Jan 15, 2025 17:50:02.384968996 CET44549733223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:02.385283947 CET49733445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.433572054 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.438538074 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:02.438620090 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.438817978 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:02.443593979 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:03.829005957 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:03.835556984 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:03.835632086 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:03.835784912 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:03.841403961 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.322967052 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.837662935 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837680101 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837697983 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837713003 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.837718010 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.837728024 CET44549754107.136.9.230192.168.2.4
                              Jan 15, 2025 17:50:04.837759018 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.837759018 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.837786913 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.837853909 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.837856054 CET4975080192.168.2.4104.16.167.228
                              Jan 15, 2025 17:50:04.838171005 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.845917940 CET8049750104.16.167.228192.168.2.4
                              Jan 15, 2025 17:50:04.845935106 CET44549754107.136.9.230192.168.2.4
                              Jan 15, 2025 17:50:04.845953941 CET44549760107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.845982075 CET49754445192.168.2.4107.136.9.230
                              Jan 15, 2025 17:50:04.846076012 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.846117973 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.847256899 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.852006912 CET44549760107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.852021933 CET44549760107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.852061033 CET49760445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.857274055 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:04.857321978 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.857378960 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:04.865904093 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:06.338695049 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.343648911 CET4454977870.146.33.215192.168.2.4
                              Jan 15, 2025 17:50:06.343740940 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.343802929 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.343971968 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.348866940 CET4454977970.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:06.348973036 CET4454977870.146.33.215192.168.2.4
                              Jan 15, 2025 17:50:06.349035025 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.349071980 CET49778445192.168.2.470.146.33.215
                              Jan 15, 2025 17:50:06.349071980 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.350177050 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.355005980 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:06.355073929 CET4454977970.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:06.355078936 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.355115891 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.355134964 CET49779445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:06.359946966 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:08.354587078 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.359591007 CET44549803164.183.20.95192.168.2.4
                              Jan 15, 2025 17:50:08.359704971 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.359755993 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.359977007 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.364747047 CET44549804164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:08.364763021 CET44549803164.183.20.95192.168.2.4
                              Jan 15, 2025 17:50:08.364862919 CET49803445192.168.2.4164.183.20.95
                              Jan 15, 2025 17:50:08.364931107 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.364931107 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.365988970 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.369785070 CET44549804164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:08.369858980 CET49804445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.370824099 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:08.370888948 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.370963097 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:08.375683069 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:10.370176077 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.375152111 CET4454982824.46.238.83192.168.2.4
                              Jan 15, 2025 17:50:10.375264883 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.375322104 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.375581980 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.380264997 CET4454982824.46.238.83192.168.2.4
                              Jan 15, 2025 17:50:10.380337000 CET49828445192.168.2.424.46.238.83
                              Jan 15, 2025 17:50:10.380409956 CET4454982924.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:10.380482912 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.380532980 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.381648064 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.385406971 CET4454982924.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:10.385499954 CET49829445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.386420965 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:10.386485100 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.386574030 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:10.391288996 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:12.622167110 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.627505064 CET4454985083.215.79.118192.168.2.4
                              Jan 15, 2025 17:50:12.627597094 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.628937960 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.629122972 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.633817911 CET4454985083.215.79.118192.168.2.4
                              Jan 15, 2025 17:50:12.633898973 CET49850445192.168.2.483.215.79.118
                              Jan 15, 2025 17:50:12.634068966 CET4454985183.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:12.634130955 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.640481949 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.644697905 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.645338058 CET4454985183.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:12.645391941 CET49851445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.649542093 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:12.649604082 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.649672985 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:12.654500008 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.324104071 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.324158907 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:14.324187994 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:14.324248075 CET49853445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:14.329015017 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.329054117 CET4454985383.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:14.447108030 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.451905012 CET44549875205.202.215.37192.168.2.4
                              Jan 15, 2025 17:50:14.451978922 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.452203989 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.452333927 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.457042933 CET44549875205.202.215.37192.168.2.4
                              Jan 15, 2025 17:50:14.457102060 CET49875445192.168.2.4205.202.215.37
                              Jan 15, 2025 17:50:14.457123041 CET44549876205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:14.457304955 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.457420111 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.457676888 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.462469101 CET44549876205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:14.462496996 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:14.462543011 CET49876445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.462568045 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.463741064 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:14.468513012 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:16.470189095 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.475343943 CET44549898163.210.141.184192.168.2.4
                              Jan 15, 2025 17:50:16.475966930 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.476046085 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.476187944 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.480979919 CET44549899163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:16.481057882 CET44549898163.210.141.184192.168.2.4
                              Jan 15, 2025 17:50:16.481069088 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.481116056 CET49898445192.168.2.4163.210.141.184
                              Jan 15, 2025 17:50:16.481288910 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.481790066 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.486180067 CET44549899163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:16.486637115 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:16.486696005 CET49899445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.486733913 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.492950916 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:16.497802019 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:17.337860107 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:17.342665911 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:17.342782021 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:17.342822075 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:17.347567081 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:18.495791912 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.500849962 CET44549925138.98.68.169192.168.2.4
                              Jan 15, 2025 17:50:18.500945091 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.501044035 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.501247883 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.506074905 CET44549925138.98.68.169192.168.2.4
                              Jan 15, 2025 17:50:18.506097078 CET44549927138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:18.506160975 CET49925445192.168.2.4138.98.68.169
                              Jan 15, 2025 17:50:18.506217003 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.506309986 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.511251926 CET44549927138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:18.511322021 CET49927445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.576242924 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.581155062 CET44549928138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:18.581228018 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.581264019 CET49928445192.168.2.4138.98.68.1
                              Jan 15, 2025 17:50:18.586113930 CET44549928138.98.68.1192.168.2.4
                              Jan 15, 2025 17:50:19.010138035 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:19.010219097 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:19.010255098 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:19.010324001 CET49912445192.168.2.483.215.79.1
                              Jan 15, 2025 17:50:19.015105009 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:19.015119076 CET4454991283.215.79.1192.168.2.4
                              Jan 15, 2025 17:50:19.072283030 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.077230930 CET4454993583.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:19.077299118 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.077325106 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.077719927 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.082406998 CET4454993583.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:19.082458019 CET49935445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.082623959 CET4454993683.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:19.082681894 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.082712889 CET49936445192.168.2.483.215.79.2
                              Jan 15, 2025 17:50:19.087519884 CET4454993683.215.79.2192.168.2.4
                              Jan 15, 2025 17:50:20.510137081 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.515073061 CET4454995187.197.225.184192.168.2.4
                              Jan 15, 2025 17:50:20.515283108 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.515470028 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.515810966 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.520348072 CET4454995187.197.225.184192.168.2.4
                              Jan 15, 2025 17:50:20.520406961 CET49951445192.168.2.487.197.225.184
                              Jan 15, 2025 17:50:20.520586014 CET4454995287.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:20.520642996 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.520673990 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.520946026 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.525572062 CET4454995287.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:20.525656939 CET49952445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.525727987 CET4454995387.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:20.525784016 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.525810003 CET49953445192.168.2.487.197.225.1
                              Jan 15, 2025 17:50:20.530529976 CET4454995387.197.225.1192.168.2.4
                              Jan 15, 2025 17:50:22.525415897 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.530548096 CET44549974184.51.220.112192.168.2.4
                              Jan 15, 2025 17:50:22.533978939 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.534013033 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.534245968 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.539181948 CET44549975184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:22.539215088 CET44549974184.51.220.112192.168.2.4
                              Jan 15, 2025 17:50:22.539310932 CET44549974184.51.220.112192.168.2.4
                              Jan 15, 2025 17:50:22.539326906 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.539354086 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.539382935 CET49974445192.168.2.4184.51.220.112
                              Jan 15, 2025 17:50:22.539809942 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.544698954 CET44549975184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:22.544730902 CET44549976184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:22.544776917 CET49975445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.544846058 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.544899940 CET49976445192.168.2.4184.51.220.1
                              Jan 15, 2025 17:50:22.549762011 CET44549976184.51.220.1192.168.2.4
                              Jan 15, 2025 17:50:23.814809084 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:23.815074921 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:23.815372944 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:23.815542936 CET49734445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:23.820182085 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:23.820318937 CET44549734223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:24.571470976 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.576658964 CET4454999878.237.131.82192.168.2.4
                              Jan 15, 2025 17:50:24.576783895 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.576859951 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.577018023 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.581904888 CET4454999978.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:24.582012892 CET4454999878.237.131.82192.168.2.4
                              Jan 15, 2025 17:50:24.582041979 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.582063913 CET49998445192.168.2.478.237.131.82
                              Jan 15, 2025 17:50:24.586863995 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.589176893 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.591768026 CET4454999978.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:24.591846943 CET49999445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.594213009 CET4455000078.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:24.594343901 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.598905087 CET50000445192.168.2.478.237.131.1
                              Jan 15, 2025 17:50:24.603810072 CET4455000078.237.131.1192.168.2.4
                              Jan 15, 2025 17:50:26.220664024 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:26.220794916 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:26.220886946 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:26.220947027 CET49761445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:26.225781918 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:26.225809097 CET44549761107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:26.573319912 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.578551054 CET44550023192.88.130.80192.168.2.4
                              Jan 15, 2025 17:50:26.578660965 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.578752041 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.578931093 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.583846092 CET44550024192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.583879948 CET44550023192.88.130.80192.168.2.4
                              Jan 15, 2025 17:50:26.583919048 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.583959103 CET50023445192.168.2.4192.88.130.80
                              Jan 15, 2025 17:50:26.584055901 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.584433079 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.589056969 CET44550024192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.589117050 CET50024445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.589314938 CET44550025192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.589385986 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.589430094 CET50025445192.168.2.4192.88.130.1
                              Jan 15, 2025 17:50:26.594305992 CET44550025192.88.130.1192.168.2.4
                              Jan 15, 2025 17:50:26.824424982 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:26.829493999 CET44550028223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:26.829575062 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:26.829684973 CET50028445192.168.2.4223.189.178.1
                              Jan 15, 2025 17:50:26.834491968 CET44550028223.189.178.1192.168.2.4
                              Jan 15, 2025 17:50:27.721019030 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:27.721127987 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:27.721478939 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:27.721543074 CET49780445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:27.726325989 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:27.726339102 CET4454978070.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:28.588193893 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.593334913 CET44550040114.79.43.81192.168.2.4
                              Jan 15, 2025 17:50:28.593440056 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.593502045 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.593729019 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.598625898 CET44550040114.79.43.81192.168.2.4
                              Jan 15, 2025 17:50:28.598661900 CET44550041114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:28.598692894 CET50040445192.168.2.4114.79.43.81
                              Jan 15, 2025 17:50:28.598726034 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.598829031 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.599097013 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.603725910 CET44550041114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:28.603781939 CET50041445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.603924990 CET44550042114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:28.603993893 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.604022980 CET50042445192.168.2.4114.79.43.1
                              Jan 15, 2025 17:50:28.608912945 CET44550042114.79.43.1192.168.2.4
                              Jan 15, 2025 17:50:29.228476048 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:29.233580112 CET44550043107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:29.233963013 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:29.234013081 CET50043445192.168.2.4107.136.9.1
                              Jan 15, 2025 17:50:29.238840103 CET44550043107.136.9.1192.168.2.4
                              Jan 15, 2025 17:50:29.752170086 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:29.752290010 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:29.752427101 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:29.752511024 CET49805445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:29.757206917 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:29.757265091 CET44549805164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:30.630592108 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.635476112 CET44550044217.156.218.50192.168.2.4
                              Jan 15, 2025 17:50:30.635577917 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.646156073 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.646409988 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.651088953 CET44550044217.156.218.50192.168.2.4
                              Jan 15, 2025 17:50:30.651170969 CET50044445192.168.2.4217.156.218.50
                              Jan 15, 2025 17:50:30.651213884 CET44550045217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.651278973 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.651890039 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.654421091 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.656655073 CET44550045217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.656724930 CET50045445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.659214973 CET44550046217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.659275055 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.659311056 CET50046445192.168.2.4217.156.218.1
                              Jan 15, 2025 17:50:30.664041042 CET44550046217.156.218.1192.168.2.4
                              Jan 15, 2025 17:50:30.732403040 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:30.737343073 CET4455004770.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:30.737452030 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:30.737571955 CET50047445192.168.2.470.146.33.1
                              Jan 15, 2025 17:50:30.742300987 CET4455004770.146.33.1192.168.2.4
                              Jan 15, 2025 17:50:31.754337072 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:31.754484892 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:31.754616976 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:31.754709959 CET49830445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:31.759371042 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:31.759444952 CET4454983024.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:32.635087013 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.640032053 CET44550048116.93.136.76192.168.2.4
                              Jan 15, 2025 17:50:32.641985893 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.642019033 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.642222881 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.646987915 CET44550048116.93.136.76192.168.2.4
                              Jan 15, 2025 17:50:32.647012949 CET44550049116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.647072077 CET50048445192.168.2.4116.93.136.76
                              Jan 15, 2025 17:50:32.647102118 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.647207022 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.647499084 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.652095079 CET44550049116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.652331114 CET44550050116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.652479887 CET50049445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.652538061 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.652607918 CET50050445192.168.2.4116.93.136.1
                              Jan 15, 2025 17:50:32.657342911 CET44550050116.93.136.1192.168.2.4
                              Jan 15, 2025 17:50:32.760441065 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:32.765608072 CET44550051164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:32.765969038 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:32.766005993 CET50051445192.168.2.4164.183.20.1
                              Jan 15, 2025 17:50:32.770814896 CET44550051164.183.20.1192.168.2.4
                              Jan 15, 2025 17:50:34.650619030 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.655644894 CET4455005249.0.35.40192.168.2.4
                              Jan 15, 2025 17:50:34.655960083 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.655996084 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.656157017 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.660888910 CET4455005349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.660967112 CET4455005249.0.35.40192.168.2.4
                              Jan 15, 2025 17:50:34.661076069 CET50052445192.168.2.449.0.35.40
                              Jan 15, 2025 17:50:34.661106110 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.661231995 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.661537886 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.666385889 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.667105913 CET4455005349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.667190075 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.667217970 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.672022104 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.674350023 CET4455005349.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:34.677962065 CET50053445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:34.759660959 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:34.764539957 CET4455005524.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:34.764938116 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:34.765003920 CET50055445192.168.2.424.46.238.1
                              Jan 15, 2025 17:50:34.769721031 CET4455005524.46.238.1192.168.2.4
                              Jan 15, 2025 17:50:35.846113920 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:35.846183062 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:35.846350908 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:35.846452951 CET49877445192.168.2.4205.202.215.1
                              Jan 15, 2025 17:50:35.851140022 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:35.851165056 CET44549877205.202.215.1192.168.2.4
                              Jan 15, 2025 17:50:36.667103052 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.672096014 CET4455005668.224.30.161192.168.2.4
                              Jan 15, 2025 17:50:36.673949003 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.674037933 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.674230099 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.678946972 CET4455005668.224.30.161192.168.2.4
                              Jan 15, 2025 17:50:36.678973913 CET4455005768.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.679032087 CET50056445192.168.2.468.224.30.161
                              Jan 15, 2025 17:50:36.679054976 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.679155111 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.679435968 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.683974028 CET4455005768.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.684035063 CET50057445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.684242964 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.684295893 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.684442043 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:36.689228058 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:36.964633942 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:36.964694977 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:36.964761019 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:36.964806080 CET50054445192.168.2.449.0.35.1
                              Jan 15, 2025 17:50:36.969470978 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:36.969520092 CET4455005449.0.35.1192.168.2.4
                              Jan 15, 2025 17:50:37.881700993 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:37.881803036 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:37.881855011 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:37.881905079 CET49900445192.168.2.4163.210.141.1
                              Jan 15, 2025 17:50:37.886646032 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:37.886660099 CET44549900163.210.141.1192.168.2.4
                              Jan 15, 2025 17:50:38.293397903 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:38.293518066 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:38.293611050 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:38.293679953 CET50058445192.168.2.468.224.30.1
                              Jan 15, 2025 17:50:38.298507929 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:38.298518896 CET4455005868.224.30.1192.168.2.4
                              Jan 15, 2025 17:50:38.541588068 CET50059445192.168.2.424.145.216.55
                              Jan 15, 2025 17:50:3