Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mCgW5qofxC.dll

Overview

General Information

Sample name:mCgW5qofxC.dll
renamed because original name is a hash value
Original sample name:2637da2286536690b1649bee21f335c1.dll
Analysis ID:1591259
MD5:2637da2286536690b1649bee21f335c1
SHA1:cf6c307ad8d95c9b71e0902ad1b45cfbe26278d0
SHA256:ef55bbed02387455cc660149d8933508887ff26c160c8704df2de3cd5d0f7e82
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4512 cmdline: loaddll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 2616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6420 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 2948 cmdline: rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 5896 cmdline: C:\WINDOWS\mssecsvc.exe MD5: FC9B6711FD800ECCBF960932F0E9B75B)
          • tasksche.exe (PID: 1372 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 16A8FDD68114C10EAE3C843FAFF5916B)
    • rundll32.exe (PID: 3352 cmdline: rundll32.exe C:\Users\user\Desktop\mCgW5qofxC.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7012 cmdline: rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 1924 cmdline: C:\WINDOWS\mssecsvc.exe MD5: FC9B6711FD800ECCBF960932F0E9B75B)
        • tasksche.exe (PID: 5008 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 16A8FDD68114C10EAE3C843FAFF5916B)
  • mssecsvc.exe (PID: 4208 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: FC9B6711FD800ECCBF960932F0E9B75B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
mCgW5qofxC.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    mCgW5qofxC.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    mCgW5qofxC.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\mssecsvc.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0x3136c:$x3: tasksche.exe
      • 0x4157c:$x3: tasksche.exe
      • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0x415d0:$x5: WNcry@2ol7
      • 0x313d7:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
      • 0xe048:$x7: mssecsvc.exe
      • 0x17350:$x7: mssecsvc.exe
      • 0x31344:$x8: C:\%s\qeriuwjhrf
      • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xe034:$s1: C:\%s\%s
      • 0x17338:$s1: C:\%s\%s
      • 0x31358:$s1: C:\%s\%s
      • 0x414d0:$s3: cmd.exe /c "%s"
      • 0x73a24:$s4: msg/m_portuguese.wnry
      • 0x2e68c:$s5: \\192.168.56.20\IPC$
      • 0x1ba81:$s6: \\172.16.99.5\IPC$
      • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
      • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
      • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
      • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      C:\Windows\mssecsvc.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
      • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
      • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
      • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
      • 0x1d439:$s1: __TREEID__PLACEHOLDER__
      • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
      • 0x1f508:$s1: __TREEID__PLACEHOLDER__
      • 0x20570:$s1: __TREEID__PLACEHOLDER__
      • 0x215d8:$s1: __TREEID__PLACEHOLDER__
      • 0x22640:$s1: __TREEID__PLACEHOLDER__
      • 0x236a8:$s1: __TREEID__PLACEHOLDER__
      • 0x24710:$s1: __TREEID__PLACEHOLDER__
      • 0x25778:$s1: __TREEID__PLACEHOLDER__
      • 0x267e0:$s1: __TREEID__PLACEHOLDER__
      • 0x27848:$s1: __TREEID__PLACEHOLDER__
      • 0x288b0:$s1: __TREEID__PLACEHOLDER__
      • 0x29918:$s1: __TREEID__PLACEHOLDER__
      • 0x2a980:$s1: __TREEID__PLACEHOLDER__
      • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
      • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
      • 0x2e340:$s1: __TREEID__PLACEHOLDER__
      C:\Windows\mssecsvc.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvc.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
      • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
      • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      Click to see the 4 entries
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.2220670094.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000009.00000000.2209536984.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          8.2.mssecsvc.exe.1eae084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          8.2.mssecsvc.exe.23cf8c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          8.2.mssecsvc.exe.1ebd104.5.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            8.2.mssecsvc.exe.1ebd104.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x32520:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0x222ec:$x3: tasksche.exe
            • 0x324fc:$x3: tasksche.exe
            • 0x324d8:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0x32550:$x5: WNcry@2ol7
            • 0x22357:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            • 0x82d0:$x7: mssecsvc.exe
            • 0x222c4:$x8: C:\%s\qeriuwjhrf
            • 0x32520:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0x82b8:$s1: C:\%s\%s
            • 0x222d8:$s1: C:\%s\%s
            • 0x32450:$s3: cmd.exe /c "%s"
            • 0x649a4:$s4: msg/m_portuguese.wnry
            • 0x1f60c:$s5: \\192.168.56.20\IPC$
            • 0xca01:$s6: \\172.16.99.5\IPC$
            • 0x25a26:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x25700:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x252ec:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            8.2.mssecsvc.exe.1ebd104.5.raw.unpackWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
            • 0xca4c:$s1: __TREEID__PLACEHOLDER__
            • 0xcae8:$s1: __TREEID__PLACEHOLDER__
            • 0xd354:$s1: __TREEID__PLACEHOLDER__
            • 0xe3b9:$s1: __TREEID__PLACEHOLDER__
            • 0xf420:$s1: __TREEID__PLACEHOLDER__
            • 0x10488:$s1: __TREEID__PLACEHOLDER__
            • 0x114f0:$s1: __TREEID__PLACEHOLDER__
            • 0x12558:$s1: __TREEID__PLACEHOLDER__
            • 0x135c0:$s1: __TREEID__PLACEHOLDER__
            • 0x14628:$s1: __TREEID__PLACEHOLDER__
            • 0x15690:$s1: __TREEID__PLACEHOLDER__
            • 0x166f8:$s1: __TREEID__PLACEHOLDER__
            • 0x17760:$s1: __TREEID__PLACEHOLDER__
            • 0x187c8:$s1: __TREEID__PLACEHOLDER__
            • 0x19830:$s1: __TREEID__PLACEHOLDER__
            • 0x1a898:$s1: __TREEID__PLACEHOLDER__
            • 0x1b900:$s1: __TREEID__PLACEHOLDER__
            • 0x1bb14:$s1: __TREEID__PLACEHOLDER__
            • 0x1bb74:$s1: __TREEID__PLACEHOLDER__
            • 0x1f244:$s1: __TREEID__PLACEHOLDER__
            • 0x1f2c0:$s1: __TREEID__PLACEHOLDER__
            Click to see the 135 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:57:07.932719+010020315153Misc activity104.16.167.22880192.168.2.649710TCP
            2025-01-14T20:57:08.783325+010020315153Misc activity104.16.167.22880192.168.2.649712TCP
            2025-01-14T20:57:09.843644+010020315153Misc activity104.16.167.22880192.168.2.649726TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:57:07.396425+010020242911A Network Trojan was detected192.168.2.6565571.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:57:07.895280+010020242981A Network Trojan was detected192.168.2.649710104.16.167.22880TCP
            2025-01-14T20:57:08.781989+010020242981A Network Trojan was detected192.168.2.649712104.16.167.22880TCP
            2025-01-14T20:57:09.843111+010020242981A Network Trojan was detected192.168.2.649726104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:57:07.895280+010020242991A Network Trojan was detected192.168.2.649710104.16.167.22880TCP
            2025-01-14T20:57:08.781989+010020242991A Network Trojan was detected192.168.2.649712104.16.167.22880TCP
            2025-01-14T20:57:09.843111+010020242991A Network Trojan was detected192.168.2.649726104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:57:07.895280+010020243011A Network Trojan was detected192.168.2.649710104.16.167.22880TCP
            2025-01-14T20:57:08.781989+010020243011A Network Trojan was detected192.168.2.649712104.16.167.22880TCP
            2025-01-14T20:57:09.843111+010020243011A Network Trojan was detected192.168.2.649726104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:57:07.895280+010020243021A Network Trojan was detected192.168.2.649710104.16.167.22880TCP
            2025-01-14T20:57:08.781989+010020243021A Network Trojan was detected192.168.2.649712104.16.167.22880TCP
            2025-01-14T20:57:09.843111+010020243021A Network Trojan was detected192.168.2.649726104.16.167.22880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T20:57:07.895280+010028033043Unknown Traffic192.168.2.649710104.16.167.22880TCP
            2025-01-14T20:57:08.781989+010028033043Unknown Traffic192.168.2.649712104.16.167.22880TCP
            2025-01-14T20:57:09.843111+010028033043Unknown Traffic192.168.2.649726104.16.167.22880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: mCgW5qofxC.dllAvira: detected
            Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 93%
            Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 100%
            Source: C:\Windows\tasksche.exeReversingLabs: Detection: 93%
            Source: mCgW5qofxC.dllReversingLabs: Detection: 94%
            Source: mCgW5qofxC.dllVirustotal: Detection: 92%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
            Source: mCgW5qofxC.dllJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

            Exploits

            barindex
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: mCgW5qofxC.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49930 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49752 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49990 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50232 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50637 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50639 version: TLS 1.2

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49726 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49726 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49726 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49726 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49710 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49710 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49710 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49710 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49712 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49712 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49712 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49712 -> 104.16.167.228:80
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:57:07 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020317bd8e442a9-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:57:08 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902031817b7cf3bb-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 19:57:09 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 902031882d99f5f8-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
            Source: unknownNetwork traffic detected: IP country count 10
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49726 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49710 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.6:49726
            Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.6:56557 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49712 -> 104.16.167.228:80
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.6:49710
            Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.6:49712
            Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49930 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.238
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.238
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.238
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.1
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.1
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.238
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.1
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.1
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.1
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.1
            Source: unknownTCP traffic detected without corresponding DNS query: 115.153.235.1
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.202
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.202
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.202
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.1
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.202
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.1
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.1
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.1
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.1
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.1
            Source: unknownTCP traffic detected without corresponding DNS query: 26.20.34.1
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.21
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.21
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.21
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.21
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.1
            Source: unknownTCP traffic detected without corresponding DNS query: 125.52.121.1
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: mssecsvc.exe.3.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            Source: mssecsvc.exe, 00000006.00000002.2210803453.0000000000C5E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2847196923.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.2221872098.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
            Source: mssecsvc.exe, 00000006.00000002.2210803453.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/&
            Source: mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/&r
            Source: mssecsvc.exe, 00000006.00000002.2210803453.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
            Source: mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2VsTk
            Source: mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6rtj
            Source: mssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/O
            Source: mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/fsDk
            Source: mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/k&s
            Source: mssecsvc.exe, 00000006.00000002.2210803453.0000000000C9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/q
            Source: mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s
            Source: mssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/x
            Source: mssecsvc.exe, 00000008.00000002.2846264612.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
            Source: mssecsvc.exe, 00000006.00000002.2210803453.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comL
            Source: mssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comV
            Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
            Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
            Source: unknownNetwork traffic detected: HTTP traffic on port 50637 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50637
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50639
            Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50232
            Source: unknownNetwork traffic detected: HTTP traffic on port 50639 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
            Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49752 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49990 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50232 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50637 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:50639 version: TLS 1.2

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
            Source: Yara matchFile source: mCgW5qofxC.dll, type: SAMPLE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee0128.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.240196c.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee0128.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23de948.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.240196c.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23da8e8.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23de948.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.23cf8c8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2852248132.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.2200457017.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.2212468574.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.2184434328.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.2221303870.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.2200675746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.2211938201.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2848443868.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.2221455318.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.2184692680.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5896, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 4208, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1924, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED
            Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

            System Summary

            barindex
            Source: mCgW5qofxC.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: mCgW5qofxC.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1eae084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23cf8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1ee0128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ee0128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1ee0128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.240196c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.240196c.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.240196c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1ee0128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ee0128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1ee0128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.23de948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23de948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.23de948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.240196c.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.240196c.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.240196c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.23da8e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23da8e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.23de948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23de948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.23cf8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.23cf8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 0000000C.00000002.2220670094.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000000.2209536984.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.2852248132.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000B.00000000.2212468574.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000000.2200675746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000C.00000000.2220295913.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.2848443868.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 0000000B.00000002.2221455318.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000006.00000000.2184692680.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
            Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
            Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
            Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
            Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
            Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
            Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
            Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
            Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
            Source: mssecsvc.exe.3.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
            Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
            Source: mCgW5qofxC.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: mCgW5qofxC.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: mCgW5qofxC.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1eae084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23cf8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1ee0128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ee0128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1ee0128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.240196c.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.240196c.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.240196c.9.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1ee0128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ee0128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1ee0128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.23de948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23de948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.23de948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.240196c.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.240196c.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.240196c.9.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.23da8e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23da8e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.23de948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23de948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.23cf8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.23cf8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvc.exe.1eae084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 0000000C.00000002.2220670094.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000000.2209536984.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.2852248132.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000B.00000000.2212468574.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000000.2200675746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000C.00000000.2220295913.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.2848443868.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 0000000B.00000002.2221455318.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000006.00000000.2184692680.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: tasksche.exe, 00000009.00000000.2209536984.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.2220670094.000000000040E000.00000008.00000001.01000000.00000007.sdmp, mCgW5qofxC.dll, mssecsvc.exe.3.dr, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
            Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
            Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
            Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2616:120:WilError_03
            Source: mCgW5qofxC.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mCgW5qofxC.dll,PlayGame
            Source: mCgW5qofxC.dllReversingLabs: Detection: 94%
            Source: mCgW5qofxC.dllVirustotal: Detection: 92%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mCgW5qofxC.dll,PlayGame
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",PlayGame
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mCgW5qofxC.dll,PlayGameJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",PlayGameJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: mCgW5qofxC.dllStatic file information: File size 5267459 > 1048576
            Source: mCgW5qofxC.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
            Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
            Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7008Thread sleep count: 91 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7008Thread sleep time: -182000s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 6544Thread sleep count: 126 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 6544Thread sleep count: 44 > 30Jump to behavior
            Source: C:\Windows\mssecsvc.exe TID: 7008Thread sleep time: -86400000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
            Source: mssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8m
            Source: mssecsvc.exe, 00000006.00000002.2210803453.0000000000CBB000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2210803453.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2847196923.0000000000CEC000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.2209123528.0000000000CEC000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.2221872098.0000000000D8C000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
            Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1Jump to behavior
            Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Service Execution
            4
            Windows Service
            4
            Windows Service
            12
            Masquerading
            OS Credential Dumping1
            Network Share Discovery
            Remote Services1
            Archive Collected Data
            22
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            21
            Virtualization/Sandbox Evasion
            LSASS Memory111
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            11
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDS2
            System Information Discovery
            Distributed Component Object ModelInput Capture3
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Rundll32
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591259 Sample: mCgW5qofxC.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->47 63 Tries to download HTTP data from a sinkholed server 2->63 65 Suricata IDS alerts for network traffic 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 6 other signatures 2->69 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 rundll32.exe 1 10->21         started        24 conhost.exe 10->24         started        49 192.168.2.102 unknown unknown 12->49 51 192.168.2.103 unknown unknown 12->51 53 98 other IPs or domains 12->53 79 Connects to many different private IPs via SMB (likely to spread or exploit) 12->79 81 Connects to many different private IPs (likely to spread or exploit) 12->81 signatures6 process7 file8 26 rundll32.exe 16->26         started        61 Drops executables to the windows directory (C:\Windows) and starts them 18->61 28 mssecsvc.exe 7 18->28         started        43 C:\Windows\mssecsvc.exe, PE32 21->43 dropped signatures9 process10 file11 32 mssecsvc.exe 7 26->32         started        45 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->45 dropped 83 Drops executables to the windows directory (C:\Windows) and starts them 28->83 36 tasksche.exe 28->36         started        signatures12 process13 file14 41 C:\Windows\tasksche.exe, PE32 32->41 dropped 55 Antivirus detection for dropped file 32->55 57 Multi AV Scanner detection for dropped file 32->57 59 Machine Learning detection for dropped file 32->59 38 tasksche.exe 32->38         started        signatures15 process16 signatures17 71 Detected Wannacry Ransomware 38->71 73 Antivirus detection for dropped file 38->73 75 Multi AV Scanner detection for dropped file 38->75 77 Machine Learning detection for dropped file 38->77

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            mCgW5qofxC.dll95%ReversingLabsWin32.Ransomware.WannaCry
            mCgW5qofxC.dll93%VirustotalBrowse
            mCgW5qofxC.dll100%AviraTR/AD.WannaCry.zlvln
            mCgW5qofxC.dll100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
            C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
            C:\Windows\mssecsvc.exe100%Joe Sandbox ML
            C:\Windows\tasksche.exe100%Joe Sandbox ML
            C:\WINDOWS\qeriuwjhrf (copy)94%ReversingLabsWin32.Ransomware.WannaCry
            C:\Windows\mssecsvc.exe100%ReversingLabsWin32.Ransomware.WannaCry
            C:\Windows\tasksche.exe94%ReversingLabsWin32.Ransomware.WannaCry
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comV0%Avira URL Cloudsafe
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comL0%Avira URL Cloudsafe
            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
            104.16.167.228
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.3.drfalse
                  high
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/smssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comLmssecsvc.exe, 00000006.00000002.2210803453.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/qmssecsvc.exe, 00000006.00000002.2210803453.0000000000C9F000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Omssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comVmssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/&mssecsvc.exe, 00000006.00000002.2210803453.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/&rmssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/2VsTkmssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 00000006.00000002.2210803453.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/fsDkmssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/k&smssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/xmssecsvc.exe, 0000000B.00000002.2221872098.0000000000D38000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6rtjmssecsvc.exe, 00000008.00000002.2847196923.0000000000CBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2846264612.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        116.178.208.121
                                        unknownChina
                                        4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                        43.54.236.1
                                        unknownJapan4249LILLY-ASUSfalse
                                        25.198.44.1
                                        unknownUnited Kingdom
                                        7922COMCAST-7922USfalse
                                        114.252.160.189
                                        unknownChina
                                        4808CHINA169-BJChinaUnicomBeijingProvinceNetworkCNfalse
                                        201.118.194.137
                                        unknownMexico
                                        8151UninetSAdeCVMXfalse
                                        26.197.227.1
                                        unknownUnited States
                                        7922COMCAST-7922USfalse
                                        137.253.225.34
                                        unknownUnited Kingdom
                                        786JANETJiscServicesLimitedGBfalse
                                        89.1.159.2
                                        unknownGermany
                                        8422NETCOLOGNEDEfalse
                                        89.1.159.1
                                        unknownGermany
                                        8422NETCOLOGNEDEfalse
                                        37.56.78.1
                                        unknownSaudi Arabia
                                        25019SAUDINETSTC-ASSAfalse
                                        38.202.131.1
                                        unknownUnited States
                                        9009M247GBfalse
                                        26.20.34.202
                                        unknownUnited States
                                        7922COMCAST-7922USfalse
                                        44.86.39.1
                                        unknownUnited States
                                        7377UCSDUSfalse
                                        52.252.59.1
                                        unknownUnited States
                                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                        38.202.131.61
                                        unknownUnited States
                                        9009M247GBfalse
                                        44.86.39.2
                                        unknownUnited States
                                        7377UCSDUSfalse
                                        98.102.89.130
                                        unknownUnited States
                                        10796TWC-10796-MIDWESTUSfalse
                                        52.252.59.4
                                        unknownUnited States
                                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                        131.241.117.1
                                        unknownUnited States
                                        3549LVLT-3549USfalse
                                        37.56.78.12
                                        unknownSaudi Arabia
                                        25019SAUDINETSTC-ASSAfalse
                                        14.86.25.59
                                        unknownKorea Republic of
                                        4766KIXS-AS-KRKoreaTelecomKRfalse
                                        115.153.235.1
                                        unknownChina
                                        4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                        193.228.157.116
                                        unknownSweden
                                        43504CENTIRO-ASSEfalse
                                        IP
                                        192.168.2.148
                                        192.168.2.149
                                        192.168.2.146
                                        192.168.2.147
                                        192.168.2.140
                                        192.168.2.141
                                        192.168.2.144
                                        192.168.2.145
                                        192.168.2.142
                                        192.168.2.143
                                        192.168.2.159
                                        192.168.2.157
                                        192.168.2.158
                                        192.168.2.151
                                        192.168.2.152
                                        192.168.2.150
                                        192.168.2.155
                                        192.168.2.156
                                        192.168.2.153
                                        192.168.2.154
                                        192.168.2.126
                                        192.168.2.247
                                        192.168.2.127
                                        192.168.2.248
                                        192.168.2.124
                                        192.168.2.245
                                        192.168.2.125
                                        192.168.2.246
                                        192.168.2.128
                                        192.168.2.249
                                        192.168.2.129
                                        192.168.2.240
                                        192.168.2.122
                                        192.168.2.243
                                        192.168.2.123
                                        192.168.2.244
                                        192.168.2.120
                                        192.168.2.241
                                        192.168.2.121
                                        192.168.2.242
                                        192.168.2.97
                                        192.168.2.137
                                        192.168.2.96
                                        192.168.2.138
                                        192.168.2.99
                                        192.168.2.135
                                        192.168.2.98
                                        192.168.2.136
                                        192.168.2.139
                                        192.168.2.250
                                        192.168.2.130
                                        192.168.2.251
                                        192.168.2.91
                                        192.168.2.90
                                        192.168.2.93
                                        192.168.2.133
                                        192.168.2.254
                                        192.168.2.92
                                        192.168.2.134
                                        192.168.2.95
                                        192.168.2.131
                                        192.168.2.252
                                        192.168.2.94
                                        192.168.2.132
                                        192.168.2.253
                                        192.168.2.104
                                        192.168.2.225
                                        192.168.2.105
                                        192.168.2.226
                                        192.168.2.102
                                        192.168.2.223
                                        192.168.2.103
                                        192.168.2.224
                                        192.168.2.108
                                        192.168.2.229
                                        192.168.2.109
                                        192.168.2.106
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1591259
                                        Start date and time:2025-01-14 20:56:09 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 44s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:17
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:mCgW5qofxC.dll
                                        renamed because original name is a hash value
                                        Original Sample Name:2637da2286536690b1649bee21f335c1.dll
                                        Detection:MAL
                                        Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                        EGA Information:
                                        • Successful, ratio: 66.7%
                                        HCA Information:Failed
                                        Cookbook Comments:
                                        • Found application associated with file extension: .dll
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                        • Excluded IPs from analysis (whitelisted): 2.17.190.73, 2.16.168.102, 199.232.214.172, 13.107.246.45, 52.149.20.212
                                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target tasksche.exe, PID 1372 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        14:57:08API Interceptor1x Sleep call for process: loaddll32.exe modified
                                        14:57:42API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                        • 104.16.166.228
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                        • 104.16.166.228
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                        • 104.16.167.228
                                        LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        qt680eucI4.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.167.228
                                        1w3BDu68Sg.dllGet hashmaliciousWannacryBrowse
                                        • 104.16.166.228
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                        • 104.16.167.228
                                        qCc1a4w5YZ.exeGet hashmaliciousWannacryBrowse
                                        • 104.17.244.81
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        LILLY-ASUSlogitix.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 43.152.64.193
                                        Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                        • 40.161.250.136
                                        http://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
                                        • 43.153.232.152
                                        Ecastillo-In Service Agreement.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 43.135.205.15
                                        meth10.elfGet hashmaliciousMiraiBrowse
                                        • 43.194.182.201
                                        arm4.elfGet hashmaliciousUnknownBrowse
                                        • 40.50.104.208
                                        ppc.elfGet hashmaliciousUnknownBrowse
                                        • 40.204.188.253
                                        m68k.elfGet hashmaliciousUnknownBrowse
                                        • 40.24.80.155
                                        i686.elfGet hashmaliciousUnknownBrowse
                                        • 40.237.228.164
                                        arm5.elfGet hashmaliciousUnknownBrowse
                                        • 43.153.179.66
                                        CHINA169-BJChinaUnicomBeijingProvinceNetworkCNmeth1.elfGet hashmaliciousMiraiBrowse
                                        • 1.94.186.186
                                        m68k.elfGet hashmaliciousUnknownBrowse
                                        • 114.246.183.13
                                        i686.elfGet hashmaliciousUnknownBrowse
                                        • 114.255.32.224
                                        x86_64.elfGet hashmaliciousUnknownBrowse
                                        • 124.68.52.200
                                        meth2.elfGet hashmaliciousMiraiBrowse
                                        • 111.192.240.184
                                        meth15.elfGet hashmaliciousMiraiBrowse
                                        • 123.122.220.189
                                        meth7.elfGet hashmaliciousMiraiBrowse
                                        • 60.207.195.72
                                        elitebotnet.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 111.208.229.170
                                        elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 116.219.82.0
                                        5.elfGet hashmaliciousUnknownBrowse
                                        • 111.193.47.96
                                        COMCAST-7922USFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                        • 68.43.54.12
                                        meth10.elfGet hashmaliciousMiraiBrowse
                                        • 50.189.178.1
                                        meth3.elfGet hashmaliciousMiraiBrowse
                                        • 69.246.125.237
                                        meth8.elfGet hashmaliciousMiraiBrowse
                                        • 50.136.199.8
                                        arm4.elfGet hashmaliciousUnknownBrowse
                                        • 73.242.202.214
                                        ppc.elfGet hashmaliciousUnknownBrowse
                                        • 25.152.149.43
                                        m68k.elfGet hashmaliciousUnknownBrowse
                                        • 96.69.200.200
                                        i686.elfGet hashmaliciousUnknownBrowse
                                        • 73.12.82.235
                                        x86.elfGet hashmaliciousUnknownBrowse
                                        • 25.151.58.104
                                        meth4.elfGet hashmaliciousMiraiBrowse
                                        • 73.26.129.67
                                        CHINA169-BACKBONECHINAUNICOMChina169BackboneCNFantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                        • 61.167.78.49
                                        meth10.elfGet hashmaliciousMiraiBrowse
                                        • 60.16.183.30
                                        meth3.elfGet hashmaliciousMiraiBrowse
                                        • 157.2.250.223
                                        meth8.elfGet hashmaliciousMiraiBrowse
                                        • 183.189.239.112
                                        arm4.elfGet hashmaliciousUnknownBrowse
                                        • 113.230.132.37
                                        ppc.elfGet hashmaliciousUnknownBrowse
                                        • 183.188.114.225
                                        m68k.elfGet hashmaliciousUnknownBrowse
                                        • 221.215.129.62
                                        i686.elfGet hashmaliciousUnknownBrowse
                                        • 42.49.158.242
                                        x86.elfGet hashmaliciousUnknownBrowse
                                        • 112.81.244.142
                                        meth4.elfGet hashmaliciousMiraiBrowse
                                        • 218.69.20.160
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        1138de370e523e824bbca92d049a3777Document_31055.pdfGet hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                        • 173.222.162.64
                                        https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                        • 173.222.162.64
                                        https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                        • 173.222.162.64
                                        https://github.com/MscrmTools/XrmToolBox/releases/download/v1.2024.9.69/XrmToolbox.zipGet hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        https://bccab.dynartis.it/TI_loc.csvGet hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        1736856908fb16676aec3e4c808c4bd5cde8e123cc70360266f85ec0ed17050bca6456c9dd274.dat-decoded.exeGet hashmaliciousXWormBrowse
                                        • 173.222.162.64
                                        https://akirapowered84501.emlnk.com/lt.php?x=3DZy~GDLVnab5KCs-Nu4WOae1qEoiN9xvxk1XaPMVXahD5B9-Uy.xuG-142imNHGet hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        http://bombasml.esGet hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        3b5074b1b5d032e5620f69f9f700ff0ehttp://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        lumma_phothockey.exeGet hashmaliciousLummaCBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        EspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        EspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 40.113.110.67
                                        • 40.115.3.253
                                        • 40.113.103.199
                                        No context
                                        Process:C:\Windows\mssecsvc.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3514368
                                        Entropy (8bit):5.085007675253267
                                        Encrypted:false
                                        SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:QqPoBhz1aRxcSUDk36SA
                                        MD5:16A8FDD68114C10EAE3C843FAFF5916B
                                        SHA1:98555EE1FD1B0A1EDCDC64CA3CC38BF8DA382C76
                                        SHA-256:84823E7430AE9E9DAEB611E986CA50000A7C66547F5CA060B320101A32A2902C
                                        SHA-512:87E96104FD98F0C46E8765F52F48E9DE0F29CA8ABD96E270F000A9DA4C17EF73FDE33441E21CA8E8517BAD103A99F3BD2BF05DCA3E934BD6DFDBA5D1C25C27EA
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 94%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3723264
                                        Entropy (8bit):5.175448064832401
                                        Encrypted:false
                                        SSDEEP:49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:yDqPoBhz1aRxcSUDk36SA
                                        MD5:FC9B6711FD800ECCBF960932F0E9B75B
                                        SHA1:54C17F1505A1A908F33CE35238AC32FB8216D113
                                        SHA-256:CEE373187F0B70F79A3E886FCE0A8F128AF53637BBEB6E9C50AF78A1166B4BEF
                                        SHA-512:451A277527CA8CC6D05315AA08589C9A3BA432256B9E716A9D74961A09FF2D5808199345CD1C43A61902CE3091B3DA945822509ED8D286E3ACCE0F944E3A6ED6
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 100%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\mssecsvc.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):3514368
                                        Entropy (8bit):5.085007675253267
                                        Encrypted:false
                                        SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:QqPoBhz1aRxcSUDk36SA
                                        MD5:16A8FDD68114C10EAE3C843FAFF5916B
                                        SHA1:98555EE1FD1B0A1EDCDC64CA3CC38BF8DA382C76
                                        SHA-256:84823E7430AE9E9DAEB611E986CA50000A7C66547F5CA060B320101A32A2902C
                                        SHA-512:87E96104FD98F0C46E8765F52F48E9DE0F29CA8ABD96E270F000A9DA4C17EF73FDE33441E21CA8E8517BAD103A99F3BD2BF05DCA3E934BD6DFDBA5D1C25C27EA
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 94%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):3.904793562147678
                                        TrID:
                                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                        • DOS Executable Generic (2002/1) 0.20%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:mCgW5qofxC.dll
                                        File size:5'267'459 bytes
                                        MD5:2637da2286536690b1649bee21f335c1
                                        SHA1:cf6c307ad8d95c9b71e0902ad1b45cfbe26278d0
                                        SHA256:ef55bbed02387455cc660149d8933508887ff26c160c8704df2de3cd5d0f7e82
                                        SHA512:f7697684cdadd2ec7690dace02b934dfdfb4dfd1fd5928195f5d237a9e3ab207d3aa7aa45ccf4e2f82091c780ed2c02797bc43b53ea4ba4951b97eafe4e8637e
                                        SSDEEP:49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:+DqPoBhz1aRxcSUDk36SA
                                        TLSH:E136335A717CD1FCC106297954A78967E7F33C9A12FE6A0F8F8049A60D13B19BF90A43
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                        Icon Hash:7ae282899bbab082
                                        Entrypoint:0x100011e9
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x10000000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                        DLL Characteristics:
                                        Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                        Instruction
                                        push ebp
                                        mov ebp, esp
                                        push ebx
                                        mov ebx, dword ptr [ebp+08h]
                                        push esi
                                        mov esi, dword ptr [ebp+0Ch]
                                        push edi
                                        mov edi, dword ptr [ebp+10h]
                                        test esi, esi
                                        jne 00007F37484CD20Bh
                                        cmp dword ptr [10003140h], 00000000h
                                        jmp 00007F37484CD228h
                                        cmp esi, 01h
                                        je 00007F37484CD207h
                                        cmp esi, 02h
                                        jne 00007F37484CD224h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007F37484CD20Bh
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        test eax, eax
                                        je 00007F37484CD20Eh
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007F37484CD11Ah
                                        test eax, eax
                                        jne 00007F37484CD206h
                                        xor eax, eax
                                        jmp 00007F37484CD250h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007F37484CCFCCh
                                        cmp esi, 01h
                                        mov dword ptr [ebp+0Ch], eax
                                        jne 00007F37484CD20Eh
                                        test eax, eax
                                        jne 00007F37484CD239h
                                        push edi
                                        push eax
                                        push ebx
                                        call 00007F37484CD0F6h
                                        test esi, esi
                                        je 00007F37484CD207h
                                        cmp esi, 03h
                                        jne 00007F37484CD228h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007F37484CD0E5h
                                        test eax, eax
                                        jne 00007F37484CD205h
                                        and dword ptr [ebp+0Ch], eax
                                        cmp dword ptr [ebp+0Ch], 00000000h
                                        je 00007F37484CD213h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007F37484CD20Ah
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        mov dword ptr [ebp+0Ch], eax
                                        mov eax, dword ptr [ebp+0Ch]
                                        pop edi
                                        pop esi
                                        pop ebx
                                        pop ebp
                                        retn 000Ch
                                        jmp dword ptr [10002028h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        Programming Language:
                                        • [ C ] VS98 (6.0) build 8168
                                        • [C++] VS98 (6.0) build 8168
                                        • [RES] VS98 (6.0) cvtres build 1720
                                        • [LNK] VS98 (6.0) imp/exp build 8168
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x40000x5000600x501000d31d5bf20a85a2f0ac68f686b23466dcunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        W0x40600x500000dataEnglishUnited States0.8770942687988281
                                        DLLImport
                                        KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                        MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                        NameOrdinalAddress
                                        PlayGame10x10001114
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-14T20:57:07.396425+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.6565571.1.1.153UDP
                                        2025-01-14T20:57:07.895280+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649710104.16.167.22880TCP
                                        2025-01-14T20:57:07.895280+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649710104.16.167.22880TCP
                                        2025-01-14T20:57:07.895280+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649710104.16.167.22880TCP
                                        2025-01-14T20:57:07.895280+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649710104.16.167.22880TCP
                                        2025-01-14T20:57:07.895280+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649710104.16.167.22880TCP
                                        2025-01-14T20:57:07.932719+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.649710TCP
                                        2025-01-14T20:57:08.781989+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649712104.16.167.22880TCP
                                        2025-01-14T20:57:08.781989+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649712104.16.167.22880TCP
                                        2025-01-14T20:57:08.781989+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649712104.16.167.22880TCP
                                        2025-01-14T20:57:08.781989+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649712104.16.167.22880TCP
                                        2025-01-14T20:57:08.781989+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649712104.16.167.22880TCP
                                        2025-01-14T20:57:08.783325+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.649712TCP
                                        2025-01-14T20:57:09.843111+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649726104.16.167.22880TCP
                                        2025-01-14T20:57:09.843111+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649726104.16.167.22880TCP
                                        2025-01-14T20:57:09.843111+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649726104.16.167.22880TCP
                                        2025-01-14T20:57:09.843111+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649726104.16.167.22880TCP
                                        2025-01-14T20:57:09.843111+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649726104.16.167.22880TCP
                                        2025-01-14T20:57:09.843644+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.649726TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 20:56:59.567717075 CET49673443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:56:59.567958117 CET49674443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:56:59.898627043 CET49672443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:03.761030912 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:03.761080027 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:03.761274099 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:03.761856079 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:03.761877060 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.569838047 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.570002079 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.574352026 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.574362040 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.574636936 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.579329967 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.579613924 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.579613924 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.579627991 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.627325058 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.758759022 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.758846045 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:04.759505987 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.759933949 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.759933949 CET49709443192.168.2.640.115.3.253
                                        Jan 14, 2025 20:57:04.759968042 CET4434970940.115.3.253192.168.2.6
                                        Jan 14, 2025 20:57:07.411268950 CET4971080192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:07.416515112 CET8049710104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:07.416618109 CET4971080192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:07.417496920 CET4971080192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:07.422378063 CET8049710104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:07.895226955 CET8049710104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:07.895241976 CET8049710104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:07.895279884 CET4971080192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:07.895307064 CET4971080192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:07.927568913 CET4971080192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:07.932718992 CET8049710104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:08.283502102 CET4971280192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:08.288367033 CET8049712104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:08.288430929 CET4971280192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:08.288737059 CET4971280192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:08.293518066 CET8049712104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:08.781863928 CET8049712104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:08.781989098 CET4971280192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:08.782116890 CET4971280192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:08.783324957 CET8049712104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:08.783382893 CET4971280192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:08.787029028 CET8049712104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:08.856177092 CET49713445192.168.2.6115.153.235.238
                                        Jan 14, 2025 20:57:08.861100912 CET44549713115.153.235.238192.168.2.6
                                        Jan 14, 2025 20:57:08.861174107 CET49713445192.168.2.6115.153.235.238
                                        Jan 14, 2025 20:57:08.861207008 CET49713445192.168.2.6115.153.235.238
                                        Jan 14, 2025 20:57:08.861394882 CET49714445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:08.866219044 CET44549714115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:08.866281033 CET49714445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:08.866373062 CET44549713115.153.235.238192.168.2.6
                                        Jan 14, 2025 20:57:08.866420984 CET49713445192.168.2.6115.153.235.238
                                        Jan 14, 2025 20:57:08.867060900 CET49714445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:08.871866941 CET44549714115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:08.871915102 CET49714445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:08.878405094 CET49715445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:08.883320093 CET44549715115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:08.883436918 CET49715445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:08.883558035 CET49715445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:08.888407946 CET44549715115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:09.177007914 CET49674443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:09.177011013 CET49673443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:09.373125076 CET4972680192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:09.378035069 CET8049726104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:09.380230904 CET4972680192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:09.380431890 CET4972680192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:09.385207891 CET8049726104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:09.505129099 CET49672443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:09.842781067 CET8049726104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:09.843111038 CET4972680192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:09.843111038 CET4972680192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:09.843643904 CET8049726104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:09.843765020 CET4972680192.168.2.6104.16.167.228
                                        Jan 14, 2025 20:57:09.847946882 CET8049726104.16.167.228192.168.2.6
                                        Jan 14, 2025 20:57:10.834520102 CET49739445192.168.2.626.20.34.202
                                        Jan 14, 2025 20:57:10.840989113 CET4454973926.20.34.202192.168.2.6
                                        Jan 14, 2025 20:57:10.841074944 CET49739445192.168.2.626.20.34.202
                                        Jan 14, 2025 20:57:10.841203928 CET49739445192.168.2.626.20.34.202
                                        Jan 14, 2025 20:57:10.841423035 CET49740445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:10.847634077 CET4454973926.20.34.202192.168.2.6
                                        Jan 14, 2025 20:57:10.847692966 CET49739445192.168.2.626.20.34.202
                                        Jan 14, 2025 20:57:10.847768068 CET4454974026.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:10.848413944 CET49740445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:10.848555088 CET49740445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:10.850636959 CET49741445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:10.855957031 CET4454974026.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:10.856004953 CET49740445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:10.856935024 CET4454974126.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:10.856998920 CET49741445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:10.858011961 CET49741445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:10.864181042 CET4454974126.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:11.247658014 CET44349705173.222.162.64192.168.2.6
                                        Jan 14, 2025 20:57:11.247791052 CET49705443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:11.910979033 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:11.911005020 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:11.911087036 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:11.912117004 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:11.912130117 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.715380907 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.715549946 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:12.717874050 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:12.717886925 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.718125105 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.719811916 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:12.719878912 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:12.719885111 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.720004082 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:12.767330885 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.834554911 CET49770445192.168.2.6125.52.121.21
                                        Jan 14, 2025 20:57:12.839365005 CET44549770125.52.121.21192.168.2.6
                                        Jan 14, 2025 20:57:12.839605093 CET49770445192.168.2.6125.52.121.21
                                        Jan 14, 2025 20:57:12.839629889 CET49770445192.168.2.6125.52.121.21
                                        Jan 14, 2025 20:57:12.839796066 CET49771445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:12.844561100 CET44549771125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:12.845187902 CET44549770125.52.121.21192.168.2.6
                                        Jan 14, 2025 20:57:12.845309019 CET49770445192.168.2.6125.52.121.21
                                        Jan 14, 2025 20:57:12.845310926 CET49771445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:12.845364094 CET49771445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:12.846544981 CET49772445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:12.850646973 CET44549771125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:12.851356030 CET44549772125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:12.851402998 CET49771445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:12.851428032 CET49772445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:12.851497889 CET49772445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:12.856302023 CET44549772125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:12.894392014 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.894543886 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:12.894670010 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:12.894881964 CET49752443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:12.894898891 CET4434975240.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:14.850769043 CET49808445192.168.2.649.79.158.87
                                        Jan 14, 2025 20:57:14.855696917 CET4454980849.79.158.87192.168.2.6
                                        Jan 14, 2025 20:57:14.855822086 CET49808445192.168.2.649.79.158.87
                                        Jan 14, 2025 20:57:14.855879068 CET49808445192.168.2.649.79.158.87
                                        Jan 14, 2025 20:57:14.856096983 CET49809445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:14.860965967 CET4454980849.79.158.87192.168.2.6
                                        Jan 14, 2025 20:57:14.860979080 CET4454980949.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:14.861058950 CET49808445192.168.2.649.79.158.87
                                        Jan 14, 2025 20:57:14.861109972 CET49809445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:14.861169100 CET49809445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:14.862760067 CET49810445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:14.866214037 CET4454980949.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:14.866292000 CET49809445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:14.867575884 CET4454981049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:14.868129969 CET49810445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:14.868129969 CET49810445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:14.872941971 CET4454981049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:16.865855932 CET49845445192.168.2.644.86.39.155
                                        Jan 14, 2025 20:57:16.870671988 CET4454984544.86.39.155192.168.2.6
                                        Jan 14, 2025 20:57:16.870742083 CET49845445192.168.2.644.86.39.155
                                        Jan 14, 2025 20:57:16.870799065 CET49845445192.168.2.644.86.39.155
                                        Jan 14, 2025 20:57:16.870970964 CET49846445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:16.875726938 CET4454984644.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:16.875737906 CET4454984544.86.39.155192.168.2.6
                                        Jan 14, 2025 20:57:16.875797987 CET49845445192.168.2.644.86.39.155
                                        Jan 14, 2025 20:57:16.875809908 CET49846445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:16.875917912 CET49846445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:16.876909971 CET49847445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:16.880702972 CET4454984644.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:16.880759001 CET49846445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:16.881937027 CET4454984744.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:16.882028103 CET49847445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:16.882086992 CET49847445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:16.886850119 CET4454984744.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:18.882364988 CET49879445192.168.2.697.239.252.179
                                        Jan 14, 2025 20:57:18.887286901 CET4454987997.239.252.179192.168.2.6
                                        Jan 14, 2025 20:57:18.887516975 CET49879445192.168.2.697.239.252.179
                                        Jan 14, 2025 20:57:18.887516975 CET49879445192.168.2.697.239.252.179
                                        Jan 14, 2025 20:57:18.887674093 CET49880445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:18.892441988 CET4454988097.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:18.892508030 CET49880445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:18.892532110 CET49880445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:18.892672062 CET4454987997.239.252.179192.168.2.6
                                        Jan 14, 2025 20:57:18.893668890 CET49879445192.168.2.697.239.252.179
                                        Jan 14, 2025 20:57:18.893668890 CET49881445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:18.897597075 CET4454988097.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:18.897670031 CET49880445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:18.898545980 CET4454988197.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:18.899971008 CET49881445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:18.899971008 CET49881445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:18.904793024 CET4454988197.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:20.904983997 CET49914445192.168.2.689.1.159.242
                                        Jan 14, 2025 20:57:20.910166979 CET4454991489.1.159.242192.168.2.6
                                        Jan 14, 2025 20:57:20.910243988 CET49914445192.168.2.689.1.159.242
                                        Jan 14, 2025 20:57:20.910376072 CET49914445192.168.2.689.1.159.242
                                        Jan 14, 2025 20:57:20.910613060 CET49915445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:20.915268898 CET4454991489.1.159.242192.168.2.6
                                        Jan 14, 2025 20:57:20.915321112 CET49914445192.168.2.689.1.159.242
                                        Jan 14, 2025 20:57:20.915364027 CET4454991589.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:20.915411949 CET49915445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:20.915492058 CET49915445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:20.920984983 CET4454991589.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:20.921021938 CET49915445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:20.926100969 CET49916445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:20.931005955 CET4454991689.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:20.931128979 CET49916445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:20.931128979 CET49916445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:20.936003923 CET4454991689.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:21.642102957 CET49705443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:21.642204046 CET49705443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:21.642962933 CET49930443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:21.643002033 CET44349930173.222.162.64192.168.2.6
                                        Jan 14, 2025 20:57:21.643754959 CET49930443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:21.648942947 CET44349705173.222.162.64192.168.2.6
                                        Jan 14, 2025 20:57:21.649095058 CET44349705173.222.162.64192.168.2.6
                                        Jan 14, 2025 20:57:21.649104118 CET49930443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:21.649116993 CET44349930173.222.162.64192.168.2.6
                                        Jan 14, 2025 20:57:22.234131098 CET44349930173.222.162.64192.168.2.6
                                        Jan 14, 2025 20:57:22.234235048 CET49930443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:22.912064075 CET49955445192.168.2.612.102.130.168
                                        Jan 14, 2025 20:57:22.917207003 CET4454995512.102.130.168192.168.2.6
                                        Jan 14, 2025 20:57:22.917335987 CET49955445192.168.2.612.102.130.168
                                        Jan 14, 2025 20:57:22.917474985 CET49955445192.168.2.612.102.130.168
                                        Jan 14, 2025 20:57:22.917723894 CET49956445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:22.922485113 CET4454995512.102.130.168192.168.2.6
                                        Jan 14, 2025 20:57:22.922646046 CET49955445192.168.2.612.102.130.168
                                        Jan 14, 2025 20:57:22.922697067 CET4454995612.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:22.922761917 CET49956445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:22.922902107 CET49956445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:22.923227072 CET49957445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:22.927881956 CET4454995612.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:22.927978039 CET49956445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:22.928318024 CET4454995712.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:22.928406000 CET49957445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:22.928488016 CET49957445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:22.933393002 CET4454995712.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:24.828275919 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:24.828324080 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:24.828407049 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:24.829252958 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:24.829279900 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:24.928638935 CET49993445192.168.2.698.102.89.130
                                        Jan 14, 2025 20:57:24.933434010 CET4454999398.102.89.130192.168.2.6
                                        Jan 14, 2025 20:57:24.933521032 CET49993445192.168.2.698.102.89.130
                                        Jan 14, 2025 20:57:24.933661938 CET49993445192.168.2.698.102.89.130
                                        Jan 14, 2025 20:57:24.933765888 CET49994445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:24.938565016 CET4454999398.102.89.130192.168.2.6
                                        Jan 14, 2025 20:57:24.938602924 CET4454999498.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:24.938627005 CET49993445192.168.2.698.102.89.130
                                        Jan 14, 2025 20:57:24.938683987 CET49994445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:24.938771963 CET49994445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:24.939172029 CET49995445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:24.943695068 CET4454999498.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:24.943748951 CET49994445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:24.944056988 CET4454999598.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:24.944123983 CET49995445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:24.944160938 CET49995445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:24.948973894 CET4454999598.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:25.888200998 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:25.888288975 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:25.894325972 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:25.894350052 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:25.894629002 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:25.897231102 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:25.897286892 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:25.897299051 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:25.897506952 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:25.939337015 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:26.071357012 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:26.071436882 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:26.071513891 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:26.071816921 CET49990443192.168.2.640.113.110.67
                                        Jan 14, 2025 20:57:26.071837902 CET4434999040.113.110.67192.168.2.6
                                        Jan 14, 2025 20:57:26.943586111 CET50028445192.168.2.643.54.236.166
                                        Jan 14, 2025 20:57:26.948359013 CET4455002843.54.236.166192.168.2.6
                                        Jan 14, 2025 20:57:26.948436022 CET50028445192.168.2.643.54.236.166
                                        Jan 14, 2025 20:57:26.948540926 CET50028445192.168.2.643.54.236.166
                                        Jan 14, 2025 20:57:26.948726892 CET50030445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:26.953418016 CET4455002843.54.236.166192.168.2.6
                                        Jan 14, 2025 20:57:26.953475952 CET50028445192.168.2.643.54.236.166
                                        Jan 14, 2025 20:57:26.953525066 CET4455003043.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:26.953583002 CET50030445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:26.953651905 CET50030445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:26.954046965 CET50031445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:26.958540916 CET4455003043.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:26.958640099 CET50030445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:26.958837986 CET4455003143.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:26.959054947 CET50031445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:26.959054947 CET50031445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:26.963865995 CET4455003143.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:28.959959030 CET50066445192.168.2.652.252.59.4
                                        Jan 14, 2025 20:57:28.964890003 CET4455006652.252.59.4192.168.2.6
                                        Jan 14, 2025 20:57:28.964966059 CET50066445192.168.2.652.252.59.4
                                        Jan 14, 2025 20:57:28.965248108 CET50066445192.168.2.652.252.59.4
                                        Jan 14, 2025 20:57:28.965430021 CET50067445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:28.970196009 CET4455006752.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:28.970484018 CET50067445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:28.970484018 CET50067445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:28.972125053 CET4455006652.252.59.4192.168.2.6
                                        Jan 14, 2025 20:57:28.972876072 CET50068445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:28.977762938 CET4455006852.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:28.977835894 CET50068445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:28.977909088 CET50068445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:28.980581045 CET4455006652.252.59.4192.168.2.6
                                        Jan 14, 2025 20:57:28.980633020 CET50066445192.168.2.652.252.59.4
                                        Jan 14, 2025 20:57:28.981213093 CET4455006752.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:28.981266975 CET50067445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:28.984392881 CET4455006852.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:30.295459986 CET44549715115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:30.295614958 CET49715445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:30.295614958 CET49715445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:30.295713902 CET49715445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:30.300390959 CET44549715115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:30.300486088 CET44549715115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:30.974654913 CET50099445192.168.2.614.86.25.59
                                        Jan 14, 2025 20:57:30.979569912 CET4455009914.86.25.59192.168.2.6
                                        Jan 14, 2025 20:57:30.979665995 CET50099445192.168.2.614.86.25.59
                                        Jan 14, 2025 20:57:30.979700089 CET50099445192.168.2.614.86.25.59
                                        Jan 14, 2025 20:57:30.979860067 CET50100445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:30.984778881 CET4455009914.86.25.59192.168.2.6
                                        Jan 14, 2025 20:57:30.984788895 CET4455010014.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:30.984842062 CET50099445192.168.2.614.86.25.59
                                        Jan 14, 2025 20:57:30.984925032 CET50100445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:30.985039949 CET50100445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:30.985336065 CET50101445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:30.989823103 CET4455010014.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:30.989886999 CET50100445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:30.990155935 CET4455010114.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:30.990294933 CET50101445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:30.990333080 CET50101445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:30.995244026 CET4455010114.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:32.256916046 CET4454974126.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:32.257392883 CET49741445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:32.261720896 CET49741445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:32.261982918 CET49741445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:32.266535997 CET4454974126.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:32.266696930 CET4454974126.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:32.990215063 CET50135445192.168.2.626.197.227.129
                                        Jan 14, 2025 20:57:32.995148897 CET4455013526.197.227.129192.168.2.6
                                        Jan 14, 2025 20:57:32.995260000 CET50135445192.168.2.626.197.227.129
                                        Jan 14, 2025 20:57:32.995305061 CET50135445192.168.2.626.197.227.129
                                        Jan 14, 2025 20:57:32.995547056 CET50136445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:33.000153065 CET4455013526.197.227.129192.168.2.6
                                        Jan 14, 2025 20:57:33.000323057 CET4455013626.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:33.000391960 CET50136445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:33.000435114 CET50136445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:33.000556946 CET4455013526.197.227.129192.168.2.6
                                        Jan 14, 2025 20:57:33.000598907 CET50135445192.168.2.626.197.227.129
                                        Jan 14, 2025 20:57:33.000814915 CET50137445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:33.005601883 CET4455013626.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:33.005680084 CET50136445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:33.005731106 CET4455013726.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:33.005800009 CET50137445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:33.005853891 CET50137445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:33.010627031 CET4455013726.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:33.308633089 CET50143445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:33.313534021 CET44550143115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:33.313616037 CET50143445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:33.313688993 CET50143445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:33.318404913 CET44550143115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:34.216489077 CET44549772125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:34.216564894 CET49772445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:34.216614962 CET49772445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:34.216691971 CET49772445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:34.221426010 CET44549772125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:34.221438885 CET44549772125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:35.093703032 CET50159445192.168.2.6116.178.208.121
                                        Jan 14, 2025 20:57:35.098635912 CET44550159116.178.208.121192.168.2.6
                                        Jan 14, 2025 20:57:35.098757982 CET50159445192.168.2.6116.178.208.121
                                        Jan 14, 2025 20:57:35.100771904 CET50159445192.168.2.6116.178.208.121
                                        Jan 14, 2025 20:57:35.105648041 CET44550159116.178.208.121192.168.2.6
                                        Jan 14, 2025 20:57:35.105741024 CET50159445192.168.2.6116.178.208.121
                                        Jan 14, 2025 20:57:35.112097025 CET50160445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:35.117014885 CET44550160116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:35.117094994 CET50160445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:35.117290020 CET50160445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:35.117866039 CET50161445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:35.122179031 CET44550160116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:35.122239113 CET50160445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:35.122637987 CET44550161116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:35.122699976 CET50161445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:35.122740030 CET50161445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:35.127559900 CET44550161116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:35.272233963 CET50164445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:35.278359890 CET4455016426.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:35.278440952 CET50164445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:35.278542995 CET50164445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:35.284529924 CET4455016426.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:36.251679897 CET4454981049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:36.251768112 CET49810445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:36.251851082 CET49810445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:36.251939058 CET49810445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:36.256624937 CET4454981049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:36.256668091 CET4454981049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:37.099741936 CET50174445192.168.2.6116.90.121.241
                                        Jan 14, 2025 20:57:37.104666948 CET44550174116.90.121.241192.168.2.6
                                        Jan 14, 2025 20:57:37.104794025 CET50174445192.168.2.6116.90.121.241
                                        Jan 14, 2025 20:57:37.104908943 CET50174445192.168.2.6116.90.121.241
                                        Jan 14, 2025 20:57:37.105113983 CET50175445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:37.109859943 CET44550175116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:57:37.109967947 CET50175445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:37.110045910 CET50175445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:37.110234022 CET44550174116.90.121.241192.168.2.6
                                        Jan 14, 2025 20:57:37.110321045 CET50174445192.168.2.6116.90.121.241
                                        Jan 14, 2025 20:57:37.110589027 CET50176445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:37.115250111 CET44550175116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:57:37.115329981 CET50175445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:37.115365028 CET44550176116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:57:37.115736961 CET50176445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:37.115787029 CET50176445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:37.120495081 CET44550176116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:57:37.225948095 CET50177445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:37.230887890 CET44550177125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:37.231029987 CET50177445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:37.231111050 CET50177445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:37.235848904 CET44550177125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:38.246210098 CET4454984744.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:38.246377945 CET49847445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:38.246447086 CET49847445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:38.246534109 CET49847445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:38.251308918 CET4454984744.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:38.251327038 CET4454984744.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:39.115241051 CET50186445192.168.2.6114.252.160.189
                                        Jan 14, 2025 20:57:39.120187998 CET44550186114.252.160.189192.168.2.6
                                        Jan 14, 2025 20:57:39.120428085 CET50186445192.168.2.6114.252.160.189
                                        Jan 14, 2025 20:57:39.120532990 CET50186445192.168.2.6114.252.160.189
                                        Jan 14, 2025 20:57:39.120819092 CET50187445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:57:39.125586987 CET44550187114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:57:39.125660896 CET50187445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:57:39.125708103 CET44550186114.252.160.189192.168.2.6
                                        Jan 14, 2025 20:57:39.125713110 CET50187445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:57:39.125756979 CET50186445192.168.2.6114.252.160.189
                                        Jan 14, 2025 20:57:39.126300097 CET50188445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:57:39.131124020 CET44550188114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:57:39.131236076 CET50188445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:57:39.131269932 CET44550187114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:57:39.131274939 CET50188445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:57:39.131334066 CET50187445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:57:39.136064053 CET44550188114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:57:39.255734921 CET50190445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:39.260637045 CET4455019049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:39.260730028 CET50190445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:39.260791063 CET50190445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:57:39.265584946 CET4455019049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:57:40.294943094 CET4454988197.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:40.296112061 CET49881445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:40.296176910 CET49881445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:40.296262026 CET49881445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:40.308401108 CET4454988197.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:40.308444977 CET4454988197.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:41.130795956 CET50200445192.168.2.6194.163.210.65
                                        Jan 14, 2025 20:57:41.135658026 CET44550200194.163.210.65192.168.2.6
                                        Jan 14, 2025 20:57:41.135742903 CET50200445192.168.2.6194.163.210.65
                                        Jan 14, 2025 20:57:41.135823011 CET50200445192.168.2.6194.163.210.65
                                        Jan 14, 2025 20:57:41.136037111 CET50201445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:57:41.140839100 CET44550200194.163.210.65192.168.2.6
                                        Jan 14, 2025 20:57:41.140851974 CET44550201194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:57:41.140893936 CET50200445192.168.2.6194.163.210.65
                                        Jan 14, 2025 20:57:41.140969992 CET50201445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:57:41.141100883 CET50201445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:57:41.141557932 CET50202445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:57:41.145889044 CET44550201194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:57:41.145940065 CET50201445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:57:41.146401882 CET44550202194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:57:41.146461010 CET50202445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:57:41.146501064 CET50202445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:57:41.151346922 CET44550202194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:57:41.255737066 CET50203445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:41.260641098 CET4455020344.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:41.260775089 CET50203445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:41.260873079 CET50203445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:57:41.265598059 CET4455020344.86.39.1192.168.2.6
                                        Jan 14, 2025 20:57:41.435720921 CET44349930173.222.162.64192.168.2.6
                                        Jan 14, 2025 20:57:41.435785055 CET49930443192.168.2.6173.222.162.64
                                        Jan 14, 2025 20:57:42.343789101 CET4454991689.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:42.343934059 CET49916445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:42.343934059 CET49916445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:42.346726894 CET49916445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:42.348794937 CET4454991689.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:42.351475954 CET4454991689.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:43.254556894 CET50212445192.168.2.638.202.131.61
                                        Jan 14, 2025 20:57:43.259432077 CET4455021238.202.131.61192.168.2.6
                                        Jan 14, 2025 20:57:43.259540081 CET50212445192.168.2.638.202.131.61
                                        Jan 14, 2025 20:57:43.259677887 CET50212445192.168.2.638.202.131.61
                                        Jan 14, 2025 20:57:43.259885073 CET50213445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:57:43.264672995 CET4455021338.202.131.1192.168.2.6
                                        Jan 14, 2025 20:57:43.264766932 CET50213445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:57:43.264775038 CET4455021238.202.131.61192.168.2.6
                                        Jan 14, 2025 20:57:43.264825106 CET50212445192.168.2.638.202.131.61
                                        Jan 14, 2025 20:57:43.264976978 CET50213445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:57:43.266804934 CET50214445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:57:43.269745111 CET4455021338.202.131.1192.168.2.6
                                        Jan 14, 2025 20:57:43.269815922 CET50213445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:57:43.271601915 CET4455021438.202.131.1192.168.2.6
                                        Jan 14, 2025 20:57:43.271671057 CET50214445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:57:43.337275982 CET50214445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:57:43.342191935 CET4455021438.202.131.1192.168.2.6
                                        Jan 14, 2025 20:57:43.555767059 CET50215445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:43.721242905 CET4455021597.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:43.721323967 CET50215445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:43.721441984 CET50215445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:57:43.726231098 CET4455021597.239.252.1192.168.2.6
                                        Jan 14, 2025 20:57:44.293869019 CET4454995712.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:44.293956995 CET49957445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:44.293992043 CET49957445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:44.294080973 CET49957445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:44.298780918 CET4454995712.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:44.298821926 CET4454995712.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:45.084357977 CET50224445192.168.2.6131.241.117.245
                                        Jan 14, 2025 20:57:45.089317083 CET44550224131.241.117.245192.168.2.6
                                        Jan 14, 2025 20:57:45.089493990 CET50224445192.168.2.6131.241.117.245
                                        Jan 14, 2025 20:57:45.089493990 CET50224445192.168.2.6131.241.117.245
                                        Jan 14, 2025 20:57:45.089627028 CET50225445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:57:45.094444990 CET44550225131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:57:45.094521999 CET50225445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:57:45.094542980 CET44550224131.241.117.245192.168.2.6
                                        Jan 14, 2025 20:57:45.094547987 CET50225445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:57:45.095074892 CET50226445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:57:45.095139980 CET50224445192.168.2.6131.241.117.245
                                        Jan 14, 2025 20:57:45.099792957 CET44550225131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:57:45.099847078 CET50225445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:57:45.099908113 CET44550226131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:57:45.099972963 CET50226445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:57:45.100006104 CET50226445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:57:45.104759932 CET44550226131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:57:45.349345922 CET50231445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:45.354494095 CET4455023189.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:45.354724884 CET50231445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:45.354724884 CET50231445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:57:45.359652042 CET4455023189.1.159.1192.168.2.6
                                        Jan 14, 2025 20:57:45.959208965 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:45.959250927 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:45.959336996 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:45.960072041 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:45.960084915 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.423717976 CET4454999598.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:46.423796892 CET49995445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:46.423830032 CET49995445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:46.423883915 CET49995445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:46.428637981 CET4454999598.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:46.428648949 CET4454999598.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:46.740674019 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.740770102 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:46.743089914 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:46.743096113 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.743465900 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.745399952 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:46.745496035 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:46.745501041 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.745738029 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:46.787341118 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.834233999 CET50240445192.168.2.653.130.241.206
                                        Jan 14, 2025 20:57:46.839222908 CET4455024053.130.241.206192.168.2.6
                                        Jan 14, 2025 20:57:46.839319944 CET50240445192.168.2.653.130.241.206
                                        Jan 14, 2025 20:57:46.839350939 CET50240445192.168.2.653.130.241.206
                                        Jan 14, 2025 20:57:46.839607000 CET50241445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:57:46.844424963 CET4455024153.130.241.1192.168.2.6
                                        Jan 14, 2025 20:57:46.844435930 CET4455024053.130.241.206192.168.2.6
                                        Jan 14, 2025 20:57:46.844532967 CET50241445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:57:46.844533920 CET50240445192.168.2.653.130.241.206
                                        Jan 14, 2025 20:57:46.844904900 CET50242445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:57:46.849538088 CET4455024153.130.241.1192.168.2.6
                                        Jan 14, 2025 20:57:46.849610090 CET50241445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:57:46.849787951 CET4455024253.130.241.1192.168.2.6
                                        Jan 14, 2025 20:57:46.849848986 CET50242445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:57:46.849894047 CET50242445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:57:46.854955912 CET4455024253.130.241.1192.168.2.6
                                        Jan 14, 2025 20:57:46.915812016 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.915921926 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:46.915999889 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:46.916223049 CET50232443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:57:46.916240931 CET4435023240.113.103.199192.168.2.6
                                        Jan 14, 2025 20:57:47.302498102 CET50244445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:47.307374954 CET4455024412.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:47.307476044 CET50244445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:47.307506084 CET50244445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:57:47.312355995 CET4455024412.102.130.1192.168.2.6
                                        Jan 14, 2025 20:57:48.324431896 CET4455003143.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:48.324567080 CET50031445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:48.324654102 CET50031445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:48.324709892 CET50031445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:48.329498053 CET4455003143.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:48.329513073 CET4455003143.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:48.474592924 CET50253445192.168.2.625.198.44.178
                                        Jan 14, 2025 20:57:48.479850054 CET4455025325.198.44.178192.168.2.6
                                        Jan 14, 2025 20:57:48.479953051 CET50253445192.168.2.625.198.44.178
                                        Jan 14, 2025 20:57:48.480061054 CET50253445192.168.2.625.198.44.178
                                        Jan 14, 2025 20:57:48.480235100 CET50254445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:57:48.485337019 CET4455025325.198.44.178192.168.2.6
                                        Jan 14, 2025 20:57:48.485399008 CET50253445192.168.2.625.198.44.178
                                        Jan 14, 2025 20:57:48.485479116 CET4455025425.198.44.1192.168.2.6
                                        Jan 14, 2025 20:57:48.485547066 CET50254445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:57:48.485649109 CET50254445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:57:48.486066103 CET50255445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:57:48.491139889 CET4455025425.198.44.1192.168.2.6
                                        Jan 14, 2025 20:57:48.491197109 CET50254445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:57:48.491266012 CET4455025525.198.44.1192.168.2.6
                                        Jan 14, 2025 20:57:48.491328001 CET50255445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:57:48.491352081 CET50255445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:57:48.496706009 CET4455025525.198.44.1192.168.2.6
                                        Jan 14, 2025 20:57:49.427292109 CET50260445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:49.432109118 CET4455026098.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:49.432193995 CET50260445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:49.432216883 CET50260445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:57:49.437017918 CET4455026098.102.89.1192.168.2.6
                                        Jan 14, 2025 20:57:50.006288052 CET50264445192.168.2.637.56.78.12
                                        Jan 14, 2025 20:57:50.011159897 CET4455026437.56.78.12192.168.2.6
                                        Jan 14, 2025 20:57:50.011317968 CET50264445192.168.2.637.56.78.12
                                        Jan 14, 2025 20:57:50.011317968 CET50264445192.168.2.637.56.78.12
                                        Jan 14, 2025 20:57:50.011481047 CET50265445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:57:50.016159058 CET4455026437.56.78.12192.168.2.6
                                        Jan 14, 2025 20:57:50.016302109 CET4455026537.56.78.1192.168.2.6
                                        Jan 14, 2025 20:57:50.016315937 CET4455026437.56.78.12192.168.2.6
                                        Jan 14, 2025 20:57:50.016366005 CET50265445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:57:50.016438007 CET50264445192.168.2.637.56.78.12
                                        Jan 14, 2025 20:57:50.016597986 CET50265445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:57:50.017113924 CET50266445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:57:50.021389961 CET4455026537.56.78.1192.168.2.6
                                        Jan 14, 2025 20:57:50.021452904 CET50265445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:57:50.021904945 CET4455026637.56.78.1192.168.2.6
                                        Jan 14, 2025 20:57:50.021977901 CET50266445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:57:50.022031069 CET50266445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:57:50.026848078 CET4455026637.56.78.1192.168.2.6
                                        Jan 14, 2025 20:57:50.377036095 CET4455006852.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:50.377185106 CET50068445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:50.377291918 CET50068445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:50.377360106 CET50068445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:50.382153034 CET4455006852.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:50.382168055 CET4455006852.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:50.864167929 CET804970484.201.210.36192.168.2.6
                                        Jan 14, 2025 20:57:50.864547014 CET4970480192.168.2.684.201.210.36
                                        Jan 14, 2025 20:57:50.864661932 CET4970480192.168.2.684.201.210.36
                                        Jan 14, 2025 20:57:50.870238066 CET804970484.201.210.36192.168.2.6
                                        Jan 14, 2025 20:57:51.333616972 CET50272445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:51.340254068 CET4455027243.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:51.340379953 CET50272445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:51.340411901 CET50272445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:57:51.346832991 CET4455027243.54.236.1192.168.2.6
                                        Jan 14, 2025 20:57:51.428095102 CET50276445192.168.2.623.233.104.201
                                        Jan 14, 2025 20:57:51.434587002 CET4455027623.233.104.201192.168.2.6
                                        Jan 14, 2025 20:57:51.434659004 CET50276445192.168.2.623.233.104.201
                                        Jan 14, 2025 20:57:51.434786081 CET50276445192.168.2.623.233.104.201
                                        Jan 14, 2025 20:57:51.434866905 CET50277445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:57:51.441323042 CET4455027723.233.104.1192.168.2.6
                                        Jan 14, 2025 20:57:51.441334963 CET4455027623.233.104.201192.168.2.6
                                        Jan 14, 2025 20:57:51.441421986 CET50276445192.168.2.623.233.104.201
                                        Jan 14, 2025 20:57:51.441485882 CET50277445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:57:51.441593885 CET50277445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:57:51.441981077 CET50278445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:57:51.446582079 CET4455027723.233.104.1192.168.2.6
                                        Jan 14, 2025 20:57:51.446722031 CET50277445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:57:51.447196007 CET4455027823.233.104.1192.168.2.6
                                        Jan 14, 2025 20:57:51.447258949 CET50278445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:57:51.447305918 CET50278445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:57:51.453680038 CET4455027823.233.104.1192.168.2.6
                                        Jan 14, 2025 20:57:52.373157978 CET4455010114.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:52.373382092 CET50101445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:52.373425961 CET50101445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:52.373450994 CET50101445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:52.379157066 CET4455010114.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:52.379168987 CET4455010114.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:52.756053925 CET50284445192.168.2.6137.253.225.34
                                        Jan 14, 2025 20:57:52.761035919 CET44550284137.253.225.34192.168.2.6
                                        Jan 14, 2025 20:57:52.761164904 CET50284445192.168.2.6137.253.225.34
                                        Jan 14, 2025 20:57:52.761207104 CET50284445192.168.2.6137.253.225.34
                                        Jan 14, 2025 20:57:52.761614084 CET50285445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:57:52.766314983 CET44550284137.253.225.34192.168.2.6
                                        Jan 14, 2025 20:57:52.766416073 CET50284445192.168.2.6137.253.225.34
                                        Jan 14, 2025 20:57:52.766439915 CET44550285137.253.225.1192.168.2.6
                                        Jan 14, 2025 20:57:52.766539097 CET50285445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:57:52.766539097 CET50285445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:57:52.767261028 CET50286445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:57:52.771591902 CET44550285137.253.225.1192.168.2.6
                                        Jan 14, 2025 20:57:52.771728992 CET50285445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:57:52.772062063 CET44550286137.253.225.1192.168.2.6
                                        Jan 14, 2025 20:57:52.772142887 CET50286445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:57:52.772213936 CET50286445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:57:52.777085066 CET44550286137.253.225.1192.168.2.6
                                        Jan 14, 2025 20:57:53.380620003 CET50291445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:53.385881901 CET4455029152.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:53.386023998 CET50291445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:53.386120081 CET50291445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:57:53.390858889 CET4455029152.252.59.1192.168.2.6
                                        Jan 14, 2025 20:57:54.005912066 CET50295445192.168.2.6177.147.64.92
                                        Jan 14, 2025 20:57:54.010821104 CET44550295177.147.64.92192.168.2.6
                                        Jan 14, 2025 20:57:54.010967970 CET50295445192.168.2.6177.147.64.92
                                        Jan 14, 2025 20:57:54.011010885 CET50295445192.168.2.6177.147.64.92
                                        Jan 14, 2025 20:57:54.011154890 CET50296445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:54.015959978 CET44550296177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:54.016068935 CET50296445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:54.016108990 CET44550295177.147.64.92192.168.2.6
                                        Jan 14, 2025 20:57:54.016114950 CET50296445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:54.016163111 CET50295445192.168.2.6177.147.64.92
                                        Jan 14, 2025 20:57:54.016546965 CET50297445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:54.021151066 CET44550296177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:54.021315098 CET44550297177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:54.021325111 CET50296445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:54.021399021 CET50297445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:54.021451950 CET50297445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:54.026196003 CET44550297177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:54.376946926 CET4455013726.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:54.377123117 CET50137445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:54.377173901 CET50137445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:54.377213001 CET50137445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:54.381997108 CET4455013726.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:54.382010937 CET4455013726.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:54.688965082 CET44550143115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:54.689089060 CET50143445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:54.689241886 CET50143445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:54.689385891 CET50143445192.168.2.6115.153.235.1
                                        Jan 14, 2025 20:57:54.694328070 CET44550143115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:54.694339037 CET44550143115.153.235.1192.168.2.6
                                        Jan 14, 2025 20:57:54.755758047 CET50301445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:57:54.760641098 CET44550301115.153.235.2192.168.2.6
                                        Jan 14, 2025 20:57:54.760725975 CET50301445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:57:54.760827065 CET50301445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:57:54.761234045 CET50302445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:57:54.765714884 CET44550301115.153.235.2192.168.2.6
                                        Jan 14, 2025 20:57:54.765759945 CET50301445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:57:54.765995979 CET44550302115.153.235.2192.168.2.6
                                        Jan 14, 2025 20:57:54.766047001 CET50302445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:57:54.766102076 CET50302445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:57:54.770816088 CET44550302115.153.235.2192.168.2.6
                                        Jan 14, 2025 20:57:55.177900076 CET50303445192.168.2.672.217.90.242
                                        Jan 14, 2025 20:57:55.182755947 CET4455030372.217.90.242192.168.2.6
                                        Jan 14, 2025 20:57:55.182845116 CET50303445192.168.2.672.217.90.242
                                        Jan 14, 2025 20:57:55.182914972 CET50303445192.168.2.672.217.90.242
                                        Jan 14, 2025 20:57:55.183157921 CET50304445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:55.187971115 CET4455030472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:55.188076973 CET50304445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:55.188136101 CET4455030372.217.90.242192.168.2.6
                                        Jan 14, 2025 20:57:55.188215971 CET50304445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:55.188726902 CET50305445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:55.193516970 CET4455030572.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:55.193597078 CET50305445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:55.193636894 CET50305445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:55.196130991 CET4455030472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:55.199445963 CET4455030572.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:55.204636097 CET4455030372.217.90.242192.168.2.6
                                        Jan 14, 2025 20:57:55.204813957 CET50303445192.168.2.672.217.90.242
                                        Jan 14, 2025 20:57:55.204881907 CET4455030472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:55.204931974 CET50304445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:55.381722927 CET50309445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:55.386739016 CET4455030914.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:55.386845112 CET50309445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:55.386924028 CET50309445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:57:55.391671896 CET4455030914.86.25.1192.168.2.6
                                        Jan 14, 2025 20:57:55.976020098 CET44550297177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:55.976099014 CET50297445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:55.976150990 CET50297445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:55.976210117 CET50297445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:55.980894089 CET44550297177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:55.980933905 CET44550297177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:56.255861044 CET50314445192.168.2.689.75.246.158
                                        Jan 14, 2025 20:57:56.260721922 CET4455031489.75.246.158192.168.2.6
                                        Jan 14, 2025 20:57:56.260932922 CET50314445192.168.2.689.75.246.158
                                        Jan 14, 2025 20:57:56.260950089 CET50314445192.168.2.689.75.246.158
                                        Jan 14, 2025 20:57:56.261123896 CET50315445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:56.265963078 CET4455031589.75.246.1192.168.2.6
                                        Jan 14, 2025 20:57:56.266028881 CET4455031489.75.246.158192.168.2.6
                                        Jan 14, 2025 20:57:56.266036034 CET50315445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:56.266061068 CET50315445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:56.266073942 CET50314445192.168.2.689.75.246.158
                                        Jan 14, 2025 20:57:56.266488075 CET50316445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:56.272202969 CET4455031589.75.246.1192.168.2.6
                                        Jan 14, 2025 20:57:56.272259951 CET50315445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:56.272480011 CET4455031689.75.246.1192.168.2.6
                                        Jan 14, 2025 20:57:56.272533894 CET50316445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:56.272578001 CET50316445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:56.277580976 CET4455031689.75.246.1192.168.2.6
                                        Jan 14, 2025 20:57:56.515877962 CET44550161116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:56.515970945 CET50161445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:56.519607067 CET50161445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:56.519658089 CET50161445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:56.524390936 CET44550161116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:56.524406910 CET44550161116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:56.654323101 CET4455016426.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:56.654429913 CET50164445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:56.654495955 CET50164445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:56.654576063 CET50164445192.168.2.626.20.34.1
                                        Jan 14, 2025 20:57:56.659632921 CET4455016426.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:56.659651041 CET4455016426.20.34.1192.168.2.6
                                        Jan 14, 2025 20:57:56.708966970 CET50317445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:57:56.713896990 CET4455031726.20.34.2192.168.2.6
                                        Jan 14, 2025 20:57:56.713984966 CET50317445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:57:56.714039087 CET50317445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:57:56.714489937 CET50319445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:57:56.719037056 CET4455031726.20.34.2192.168.2.6
                                        Jan 14, 2025 20:57:56.719120979 CET50317445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:57:56.719276905 CET4455031926.20.34.2192.168.2.6
                                        Jan 14, 2025 20:57:56.719348907 CET50319445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:57:56.719383001 CET50319445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:57:56.724566936 CET4455031926.20.34.2192.168.2.6
                                        Jan 14, 2025 20:57:56.785885096 CET4455030572.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:56.785964966 CET50305445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:56.786010981 CET50305445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:56.786058903 CET50305445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:56.790920973 CET4455030572.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:56.790939093 CET4455030572.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:57.271981955 CET50324445192.168.2.6193.228.157.116
                                        Jan 14, 2025 20:57:57.276856899 CET44550324193.228.157.116192.168.2.6
                                        Jan 14, 2025 20:57:57.276994944 CET50324445192.168.2.6193.228.157.116
                                        Jan 14, 2025 20:57:57.277089119 CET50325445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:57.277091026 CET50324445192.168.2.6193.228.157.116
                                        Jan 14, 2025 20:57:57.281878948 CET44550325193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:57:57.281946898 CET50325445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:57.281991005 CET44550324193.228.157.116192.168.2.6
                                        Jan 14, 2025 20:57:57.282049894 CET50324445192.168.2.6193.228.157.116
                                        Jan 14, 2025 20:57:57.282089949 CET50325445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:57.282393932 CET50326445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:57.286904097 CET44550325193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:57:57.286978960 CET50325445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:57.287240028 CET44550326193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:57:57.287292957 CET50326445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:57.287343025 CET50326445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:57.292097092 CET44550326193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:57:57.380609035 CET50327445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:57.386378050 CET4455032726.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:57.386528015 CET50327445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:57.386579037 CET50327445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:57:57.391442060 CET4455032726.197.227.1192.168.2.6
                                        Jan 14, 2025 20:57:58.053327084 CET4455031689.75.246.1192.168.2.6
                                        Jan 14, 2025 20:57:58.054481030 CET50316445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:58.054548025 CET50316445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:58.054600954 CET50316445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:57:58.059381008 CET4455031689.75.246.1192.168.2.6
                                        Jan 14, 2025 20:57:58.059391975 CET4455031689.75.246.1192.168.2.6
                                        Jan 14, 2025 20:57:58.208913088 CET50334445192.168.2.649.158.7.42
                                        Jan 14, 2025 20:57:58.213694096 CET4455033449.158.7.42192.168.2.6
                                        Jan 14, 2025 20:57:58.213783026 CET50334445192.168.2.649.158.7.42
                                        Jan 14, 2025 20:57:58.213825941 CET50334445192.168.2.649.158.7.42
                                        Jan 14, 2025 20:57:58.214047909 CET50335445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:57:58.218699932 CET4455033449.158.7.42192.168.2.6
                                        Jan 14, 2025 20:57:58.218764067 CET50334445192.168.2.649.158.7.42
                                        Jan 14, 2025 20:57:58.218836069 CET4455033549.158.7.1192.168.2.6
                                        Jan 14, 2025 20:57:58.218887091 CET50335445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:57:58.218928099 CET50335445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:57:58.219229937 CET50336445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:57:58.223844051 CET4455033549.158.7.1192.168.2.6
                                        Jan 14, 2025 20:57:58.223908901 CET50335445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:57:58.223999023 CET4455033649.158.7.1192.168.2.6
                                        Jan 14, 2025 20:57:58.227200985 CET50336445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:57:58.227263927 CET50336445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:57:58.232008934 CET4455033649.158.7.1192.168.2.6
                                        Jan 14, 2025 20:57:58.547147989 CET44550176116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:57:58.547224998 CET50176445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:58.547267914 CET50176445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:58.547307014 CET50176445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:57:58.552105904 CET44550176116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:57:58.552120924 CET44550176116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:57:58.790512085 CET44550177125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:58.790591002 CET50177445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:58.790709972 CET50177445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:58.790874958 CET50177445192.168.2.6125.52.121.1
                                        Jan 14, 2025 20:57:58.795422077 CET44550177125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:58.795630932 CET44550177125.52.121.1192.168.2.6
                                        Jan 14, 2025 20:57:58.849690914 CET50342445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:57:58.854645967 CET44550342125.52.121.2192.168.2.6
                                        Jan 14, 2025 20:57:58.854768991 CET50342445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:57:58.854823112 CET50342445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:57:58.855231047 CET50343445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:57:58.859816074 CET44550342125.52.121.2192.168.2.6
                                        Jan 14, 2025 20:57:58.859896898 CET50342445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:57:58.860050917 CET44550343125.52.121.2192.168.2.6
                                        Jan 14, 2025 20:57:58.860115051 CET50343445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:57:58.860151052 CET50343445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:57:58.864943981 CET44550343125.52.121.2192.168.2.6
                                        Jan 14, 2025 20:57:58.971431017 CET44550326193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:57:58.971507072 CET50326445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:58.971549034 CET50326445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:58.971596956 CET50326445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:57:58.976450920 CET44550326193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:57:58.976468086 CET44550326193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:57:58.989814997 CET50344445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:58.994653940 CET44550344177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:58.994736910 CET50344445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:58.994791985 CET50344445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:57:58.999708891 CET44550344177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:57:59.083869934 CET50346445192.168.2.6158.143.48.67
                                        Jan 14, 2025 20:57:59.088701963 CET44550346158.143.48.67192.168.2.6
                                        Jan 14, 2025 20:57:59.088771105 CET50346445192.168.2.6158.143.48.67
                                        Jan 14, 2025 20:57:59.088865042 CET50346445192.168.2.6158.143.48.67
                                        Jan 14, 2025 20:57:59.089135885 CET50347445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:57:59.093689919 CET44550346158.143.48.67192.168.2.6
                                        Jan 14, 2025 20:57:59.093744993 CET50346445192.168.2.6158.143.48.67
                                        Jan 14, 2025 20:57:59.093970060 CET44550347158.143.48.1192.168.2.6
                                        Jan 14, 2025 20:57:59.094043016 CET50347445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:57:59.094115019 CET50347445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:57:59.094475985 CET50348445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:57:59.098915100 CET44550347158.143.48.1192.168.2.6
                                        Jan 14, 2025 20:57:59.098978996 CET50347445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:57:59.099268913 CET44550348158.143.48.1192.168.2.6
                                        Jan 14, 2025 20:57:59.099343061 CET50348445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:57:59.099375010 CET50348445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:57:59.104237080 CET44550348158.143.48.1192.168.2.6
                                        Jan 14, 2025 20:57:59.521121025 CET50352445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:59.525958061 CET44550352116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:59.526058912 CET50352445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:59.526058912 CET50352445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:57:59.530915976 CET44550352116.178.208.1192.168.2.6
                                        Jan 14, 2025 20:57:59.786832094 CET50354445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:59.791695118 CET4455035472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:59.791913033 CET50354445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:59.791913033 CET50354445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:57:59.796849966 CET4455035472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:57:59.912414074 CET50357445192.168.2.618.241.31.36
                                        Jan 14, 2025 20:57:59.917432070 CET4455035718.241.31.36192.168.2.6
                                        Jan 14, 2025 20:57:59.917591095 CET50357445192.168.2.618.241.31.36
                                        Jan 14, 2025 20:57:59.917612076 CET50357445192.168.2.618.241.31.36
                                        Jan 14, 2025 20:57:59.917783022 CET50358445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:57:59.922609091 CET4455035818.241.31.1192.168.2.6
                                        Jan 14, 2025 20:57:59.922693968 CET4455035718.241.31.36192.168.2.6
                                        Jan 14, 2025 20:57:59.922691107 CET50358445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:57:59.922749043 CET50358445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:57:59.922760010 CET50357445192.168.2.618.241.31.36
                                        Jan 14, 2025 20:57:59.923109055 CET50359445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:57:59.927925110 CET4455035918.241.31.1192.168.2.6
                                        Jan 14, 2025 20:57:59.927938938 CET4455035818.241.31.1192.168.2.6
                                        Jan 14, 2025 20:57:59.928002119 CET50358445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:57:59.928025961 CET50359445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:57:59.928097010 CET50359445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:57:59.932881117 CET4455035918.241.31.1192.168.2.6
                                        Jan 14, 2025 20:58:00.500236034 CET44550188114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:58:00.500303030 CET50188445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:58:00.500348091 CET50188445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:58:00.500386000 CET50188445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:58:00.505219936 CET44550188114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:58:00.505235910 CET44550188114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:58:00.622415066 CET4455019049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:58:00.622581005 CET50190445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:58:00.622637987 CET50190445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:58:00.622718096 CET50190445192.168.2.649.79.158.1
                                        Jan 14, 2025 20:58:00.627814054 CET4455019049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:58:00.627825975 CET4455019049.79.158.1192.168.2.6
                                        Jan 14, 2025 20:58:00.677714109 CET50360445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:00.682641029 CET4455036049.79.158.2192.168.2.6
                                        Jan 14, 2025 20:58:00.682751894 CET50360445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:00.682887077 CET50360445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:00.683844090 CET50361445192.168.2.6201.118.194.137
                                        Jan 14, 2025 20:58:00.683984995 CET50362445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:00.687876940 CET4455036049.79.158.2192.168.2.6
                                        Jan 14, 2025 20:58:00.687932968 CET50360445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:00.688677073 CET44550361201.118.194.137192.168.2.6
                                        Jan 14, 2025 20:58:00.688750982 CET50361445192.168.2.6201.118.194.137
                                        Jan 14, 2025 20:58:00.688776016 CET50361445192.168.2.6201.118.194.137
                                        Jan 14, 2025 20:58:00.688787937 CET4455036249.79.158.2192.168.2.6
                                        Jan 14, 2025 20:58:00.688832998 CET50362445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:00.688942909 CET50362445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:00.688942909 CET50363445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:00.693851948 CET4455036249.79.158.2192.168.2.6
                                        Jan 14, 2025 20:58:00.693870068 CET44550363201.118.194.1192.168.2.6
                                        Jan 14, 2025 20:58:00.694036007 CET50363445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:00.694104910 CET50363445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:00.694214106 CET44550361201.118.194.137192.168.2.6
                                        Jan 14, 2025 20:58:00.694259882 CET50361445192.168.2.6201.118.194.137
                                        Jan 14, 2025 20:58:00.694485903 CET50364445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:00.699044943 CET44550363201.118.194.1192.168.2.6
                                        Jan 14, 2025 20:58:00.699178934 CET50363445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:00.699266911 CET44550364201.118.194.1192.168.2.6
                                        Jan 14, 2025 20:58:00.699333906 CET50364445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:00.699352026 CET50364445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:00.704155922 CET44550364201.118.194.1192.168.2.6
                                        Jan 14, 2025 20:58:00.931237936 CET44550344177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:58:00.931406975 CET50344445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:58:00.931458950 CET50344445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:58:00.931503057 CET50344445192.168.2.6177.147.64.1
                                        Jan 14, 2025 20:58:00.936758995 CET44550344177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:58:00.936770916 CET44550344177.147.64.1192.168.2.6
                                        Jan 14, 2025 20:58:00.990173101 CET50365445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:00.995079041 CET44550365177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:00.995206118 CET50365445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:00.995349884 CET50365445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:00.995702028 CET50366445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:01.000210047 CET44550365177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:01.000368118 CET44550365177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:01.000413895 CET50365445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:01.000534058 CET44550366177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:01.000588894 CET50366445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:01.000629902 CET50366445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:01.005379915 CET44550366177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:01.068213940 CET50367445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:58:01.073136091 CET4455036789.75.246.1192.168.2.6
                                        Jan 14, 2025 20:58:01.073256016 CET50367445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:58:01.073309898 CET50367445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:58:01.078078985 CET4455036789.75.246.1192.168.2.6
                                        Jan 14, 2025 20:58:01.373563051 CET4455035472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:58:01.373729944 CET50354445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:58:01.373773098 CET50354445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:58:01.373817921 CET50354445192.168.2.672.217.90.1
                                        Jan 14, 2025 20:58:01.378675938 CET4455035472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:58:01.378686905 CET4455035472.217.90.1192.168.2.6
                                        Jan 14, 2025 20:58:01.427551985 CET50369445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:01.432585955 CET4455036972.217.90.2192.168.2.6
                                        Jan 14, 2025 20:58:01.432729006 CET50369445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:01.432877064 CET50369445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:01.433386087 CET50370445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:01.438256979 CET4455037072.217.90.2192.168.2.6
                                        Jan 14, 2025 20:58:01.438272953 CET4455036972.217.90.2192.168.2.6
                                        Jan 14, 2025 20:58:01.438374043 CET50369445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:01.438391924 CET50370445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:01.438483953 CET50370445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:01.443259001 CET4455037072.217.90.2192.168.2.6
                                        Jan 14, 2025 20:58:01.552567005 CET50371445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:58:01.557507992 CET44550371116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:58:01.557672977 CET50371445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:58:01.557708025 CET50371445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:58:01.562514067 CET44550371116.90.121.1192.168.2.6
                                        Jan 14, 2025 20:58:01.974456072 CET50372445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:58:01.980288982 CET44550372193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:58:01.980458021 CET50372445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:58:01.980520010 CET50372445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:58:01.985253096 CET44550372193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:58:02.513720989 CET44550202194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:58:02.513791084 CET50202445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:58:02.513890982 CET50202445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:58:02.513937950 CET50202445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:58:02.518754959 CET44550202194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:58:02.518773079 CET44550202194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:58:02.672151089 CET4455020344.86.39.1192.168.2.6
                                        Jan 14, 2025 20:58:02.672233105 CET50203445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:58:02.672343016 CET50203445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:58:02.672446012 CET50203445192.168.2.644.86.39.1
                                        Jan 14, 2025 20:58:02.677174091 CET4455020344.86.39.1192.168.2.6
                                        Jan 14, 2025 20:58:02.677408934 CET4455020344.86.39.1192.168.2.6
                                        Jan 14, 2025 20:58:02.803545952 CET50376445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:02.809478998 CET4455037644.86.39.2192.168.2.6
                                        Jan 14, 2025 20:58:02.809551001 CET50376445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:02.809757948 CET50376445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:02.814037085 CET50377445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:02.815121889 CET4455037644.86.39.2192.168.2.6
                                        Jan 14, 2025 20:58:02.815172911 CET50376445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:02.818914890 CET4455037744.86.39.2192.168.2.6
                                        Jan 14, 2025 20:58:02.818968058 CET50377445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:02.819041967 CET50377445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:02.823769093 CET4455037744.86.39.2192.168.2.6
                                        Jan 14, 2025 20:58:02.848902941 CET4455036789.75.246.1192.168.2.6
                                        Jan 14, 2025 20:58:02.848979950 CET50367445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:58:02.849265099 CET50367445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:58:02.849309921 CET50367445192.168.2.689.75.246.1
                                        Jan 14, 2025 20:58:02.854074955 CET4455036789.75.246.1192.168.2.6
                                        Jan 14, 2025 20:58:02.854087114 CET4455036789.75.246.1192.168.2.6
                                        Jan 14, 2025 20:58:02.911833048 CET50378445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:02.916759014 CET4455037889.75.246.2192.168.2.6
                                        Jan 14, 2025 20:58:02.916836977 CET50378445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:02.916995049 CET50378445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:02.917460918 CET50379445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:02.922023058 CET4455037889.75.246.2192.168.2.6
                                        Jan 14, 2025 20:58:02.922076941 CET50378445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:02.922239065 CET4455037989.75.246.2192.168.2.6
                                        Jan 14, 2025 20:58:02.922307014 CET50379445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:02.922341108 CET50379445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:02.927123070 CET4455037989.75.246.2192.168.2.6
                                        Jan 14, 2025 20:58:02.927402020 CET44550366177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:02.927453041 CET50366445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:02.927505016 CET50366445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:02.927561045 CET50366445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:02.932297945 CET44550366177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:02.932308912 CET44550366177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:03.505688906 CET50382445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:58:03.510859013 CET44550382114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:58:03.511090994 CET50382445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:58:03.511137009 CET50382445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:58:03.516171932 CET44550382114.252.160.1192.168.2.6
                                        Jan 14, 2025 20:58:03.684451103 CET44550372193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:58:03.684622049 CET50372445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:58:03.684672117 CET50372445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:58:03.684726954 CET50372445192.168.2.6193.228.157.1
                                        Jan 14, 2025 20:58:03.689409018 CET44550372193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:58:03.689431906 CET44550372193.228.157.1192.168.2.6
                                        Jan 14, 2025 20:58:03.740011930 CET50384445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:03.744765997 CET44550384193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:03.744842052 CET50384445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:03.744920969 CET50384445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:03.745429993 CET50385445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:03.749716043 CET44550384193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:03.749773979 CET50384445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:03.750235081 CET44550385193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:03.750288010 CET50385445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:03.750333071 CET50385445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:03.755043983 CET44550385193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:04.637279034 CET4455021438.202.131.1192.168.2.6
                                        Jan 14, 2025 20:58:04.637481928 CET50214445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:58:04.637526035 CET50214445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:58:04.637615919 CET50214445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:58:04.642448902 CET4455021438.202.131.1192.168.2.6
                                        Jan 14, 2025 20:58:04.642465115 CET4455021438.202.131.1192.168.2.6
                                        Jan 14, 2025 20:58:05.090950966 CET4455021597.239.252.1192.168.2.6
                                        Jan 14, 2025 20:58:05.091104031 CET50215445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:58:05.091269016 CET50215445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:58:05.091327906 CET50215445192.168.2.697.239.252.1
                                        Jan 14, 2025 20:58:05.096189022 CET4455021597.239.252.1192.168.2.6
                                        Jan 14, 2025 20:58:05.096203089 CET4455021597.239.252.1192.168.2.6
                                        Jan 14, 2025 20:58:05.146497011 CET50395445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:05.151385069 CET4455039597.239.252.2192.168.2.6
                                        Jan 14, 2025 20:58:05.151460886 CET50395445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:05.151535988 CET50395445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:05.151945114 CET50396445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:05.156574011 CET4455039597.239.252.2192.168.2.6
                                        Jan 14, 2025 20:58:05.156639099 CET50395445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:05.156757116 CET4455039697.239.252.2192.168.2.6
                                        Jan 14, 2025 20:58:05.156815052 CET50396445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:05.156847000 CET50396445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:05.161570072 CET4455039697.239.252.2192.168.2.6
                                        Jan 14, 2025 20:58:05.435981035 CET44550385193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:05.436145067 CET50385445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:05.436184883 CET50385445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:05.436239958 CET50385445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:05.440969944 CET44550385193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:05.440983057 CET44550385193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:05.521234035 CET50399445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:58:05.526161909 CET44550399194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:58:05.526276112 CET50399445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:58:05.526360035 CET50399445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:58:05.531191111 CET44550399194.163.210.1192.168.2.6
                                        Jan 14, 2025 20:58:05.943025112 CET50404445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:05.947838068 CET44550404177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:05.947923899 CET50404445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:05.947997093 CET50404445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:05.952795982 CET44550404177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:06.486594915 CET44550226131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:58:06.486747026 CET50226445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:58:06.486790895 CET50226445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:58:06.486844063 CET50226445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:58:06.491581917 CET44550226131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:58:06.491612911 CET44550226131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:58:06.715435028 CET4455023189.1.159.1192.168.2.6
                                        Jan 14, 2025 20:58:06.715586901 CET50231445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:58:06.715586901 CET50231445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:58:06.715640068 CET50231445192.168.2.689.1.159.1
                                        Jan 14, 2025 20:58:06.720474005 CET4455023189.1.159.1192.168.2.6
                                        Jan 14, 2025 20:58:06.720487118 CET4455023189.1.159.1192.168.2.6
                                        Jan 14, 2025 20:58:06.771509886 CET50414445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:06.776458025 CET4455041489.1.159.2192.168.2.6
                                        Jan 14, 2025 20:58:06.776566982 CET50414445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:06.776619911 CET50414445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:06.777048111 CET50415445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:06.781742096 CET4455041489.1.159.2192.168.2.6
                                        Jan 14, 2025 20:58:06.781836033 CET50414445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:06.781876087 CET4455041589.1.159.2192.168.2.6
                                        Jan 14, 2025 20:58:06.781940937 CET50415445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:06.782011032 CET50415445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:06.786840916 CET4455041589.1.159.2192.168.2.6
                                        Jan 14, 2025 20:58:07.653201103 CET50428445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:58:07.658211946 CET4455042838.202.131.1192.168.2.6
                                        Jan 14, 2025 20:58:07.658287048 CET50428445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:58:07.658354044 CET50428445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:58:07.663168907 CET4455042838.202.131.1192.168.2.6
                                        Jan 14, 2025 20:58:07.846105099 CET44550404177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:07.846172094 CET50404445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:07.846236944 CET50404445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:07.846319914 CET50404445192.168.2.6177.147.64.2
                                        Jan 14, 2025 20:58:07.851111889 CET44550404177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:07.851130009 CET44550404177.147.64.2192.168.2.6
                                        Jan 14, 2025 20:58:07.912868977 CET50432445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:07.917948961 CET44550432177.147.64.3192.168.2.6
                                        Jan 14, 2025 20:58:07.918052912 CET50432445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:07.918203115 CET50432445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:07.918685913 CET50433445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:07.923331022 CET44550432177.147.64.3192.168.2.6
                                        Jan 14, 2025 20:58:07.923398972 CET50432445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:07.923526049 CET44550433177.147.64.3192.168.2.6
                                        Jan 14, 2025 20:58:07.923616886 CET50433445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:07.923687935 CET50433445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:07.928455114 CET44550433177.147.64.3192.168.2.6
                                        Jan 14, 2025 20:58:08.215342999 CET4455024253.130.241.1192.168.2.6
                                        Jan 14, 2025 20:58:08.215428114 CET50242445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:58:08.215476036 CET50242445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:58:08.215532064 CET50242445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:58:08.220293045 CET4455024253.130.241.1192.168.2.6
                                        Jan 14, 2025 20:58:08.220316887 CET4455024253.130.241.1192.168.2.6
                                        Jan 14, 2025 20:58:08.443079948 CET50444445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:08.447875977 CET44550444193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:08.448015928 CET50444445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:08.448059082 CET50444445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:08.452963114 CET44550444193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:08.668541908 CET4455024412.102.130.1192.168.2.6
                                        Jan 14, 2025 20:58:08.668768883 CET50244445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:58:08.668839931 CET50244445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:58:08.668945074 CET50244445192.168.2.612.102.130.1
                                        Jan 14, 2025 20:58:08.673676014 CET4455024412.102.130.1192.168.2.6
                                        Jan 14, 2025 20:58:08.673748016 CET4455024412.102.130.1192.168.2.6
                                        Jan 14, 2025 20:58:08.724675894 CET50448445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:08.729762077 CET4455044812.102.130.2192.168.2.6
                                        Jan 14, 2025 20:58:08.729887962 CET50448445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:08.729928017 CET50448445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:08.730561972 CET50450445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:08.735402107 CET4455045012.102.130.2192.168.2.6
                                        Jan 14, 2025 20:58:08.735572100 CET50450445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:08.735621929 CET50450445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:08.736129045 CET4455044812.102.130.2192.168.2.6
                                        Jan 14, 2025 20:58:08.736838102 CET4455044812.102.130.2192.168.2.6
                                        Jan 14, 2025 20:58:08.736926079 CET50448445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:08.740402937 CET4455045012.102.130.2192.168.2.6
                                        Jan 14, 2025 20:58:09.489841938 CET50469445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:58:09.494654894 CET44550469131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:58:09.494807005 CET50469445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:58:09.494826078 CET50469445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:58:09.499721050 CET44550469131.241.117.1192.168.2.6
                                        Jan 14, 2025 20:58:09.855832100 CET4455025525.198.44.1192.168.2.6
                                        Jan 14, 2025 20:58:09.855914116 CET50255445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:58:09.856086016 CET50255445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:58:09.856086016 CET50255445192.168.2.625.198.44.1
                                        Jan 14, 2025 20:58:09.861394882 CET4455025525.198.44.1192.168.2.6
                                        Jan 14, 2025 20:58:09.861404896 CET4455025525.198.44.1192.168.2.6
                                        Jan 14, 2025 20:58:10.126516104 CET44550444193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:10.126660109 CET50444445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:10.129735947 CET50444445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:10.129774094 CET50444445192.168.2.6193.228.157.2
                                        Jan 14, 2025 20:58:10.134995937 CET44550444193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:10.135006905 CET44550444193.228.157.2192.168.2.6
                                        Jan 14, 2025 20:58:10.264369965 CET50489445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:10.269354105 CET44550489193.228.157.3192.168.2.6
                                        Jan 14, 2025 20:58:10.269423008 CET50489445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:10.272898912 CET50489445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:10.277795076 CET44550489193.228.157.3192.168.2.6
                                        Jan 14, 2025 20:58:10.277849913 CET50489445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:10.281276941 CET50491445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:10.286108971 CET44550491193.228.157.3192.168.2.6
                                        Jan 14, 2025 20:58:10.286205053 CET50491445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:10.289335012 CET50491445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:10.294122934 CET44550491193.228.157.3192.168.2.6
                                        Jan 14, 2025 20:58:10.793565035 CET4455026098.102.89.1192.168.2.6
                                        Jan 14, 2025 20:58:10.793685913 CET50260445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:58:10.793725014 CET50260445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:58:10.793761015 CET50260445192.168.2.698.102.89.1
                                        Jan 14, 2025 20:58:10.798507929 CET4455026098.102.89.1192.168.2.6
                                        Jan 14, 2025 20:58:10.798536062 CET4455026098.102.89.1192.168.2.6
                                        Jan 14, 2025 20:58:10.849356890 CET50510445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:10.854285955 CET4455051098.102.89.2192.168.2.6
                                        Jan 14, 2025 20:58:10.854381084 CET50510445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:10.854454994 CET50510445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:10.854758978 CET50511445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:10.859430075 CET4455051098.102.89.2192.168.2.6
                                        Jan 14, 2025 20:58:10.859489918 CET50510445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:10.859541893 CET4455051198.102.89.2192.168.2.6
                                        Jan 14, 2025 20:58:10.859600067 CET50511445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:10.859647036 CET50511445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:10.864428043 CET4455051198.102.89.2192.168.2.6
                                        Jan 14, 2025 20:58:11.224488020 CET50527445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:58:11.229382038 CET4455052753.130.241.1192.168.2.6
                                        Jan 14, 2025 20:58:11.229578972 CET50527445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:58:11.229604006 CET50527445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:58:11.234414101 CET4455052753.130.241.1192.168.2.6
                                        Jan 14, 2025 20:58:11.389363050 CET4455026637.56.78.1192.168.2.6
                                        Jan 14, 2025 20:58:11.389617920 CET50266445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:58:11.389694929 CET50266445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:58:11.389717102 CET50266445192.168.2.637.56.78.1
                                        Jan 14, 2025 20:58:11.394673109 CET4455026637.56.78.1192.168.2.6
                                        Jan 14, 2025 20:58:11.394714117 CET4455026637.56.78.1192.168.2.6
                                        Jan 14, 2025 20:58:12.699820042 CET4455027243.54.236.1192.168.2.6
                                        Jan 14, 2025 20:58:12.699886084 CET50272445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:58:12.833043098 CET4455027823.233.104.1192.168.2.6
                                        Jan 14, 2025 20:58:12.833199024 CET50278445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:58:14.032330990 CET50343445192.168.2.6125.52.121.2
                                        Jan 14, 2025 20:58:14.032392979 CET50415445192.168.2.689.1.159.2
                                        Jan 14, 2025 20:58:14.032438040 CET50319445192.168.2.626.20.34.2
                                        Jan 14, 2025 20:58:14.032501936 CET50396445192.168.2.697.239.252.2
                                        Jan 14, 2025 20:58:14.032540083 CET50302445192.168.2.6115.153.235.2
                                        Jan 14, 2025 20:58:14.032655001 CET50272445192.168.2.643.54.236.1
                                        Jan 14, 2025 20:58:14.032702923 CET50278445192.168.2.623.233.104.1
                                        Jan 14, 2025 20:58:14.032720089 CET50286445192.168.2.6137.253.225.1
                                        Jan 14, 2025 20:58:14.032752991 CET50291445192.168.2.652.252.59.1
                                        Jan 14, 2025 20:58:14.032820940 CET50309445192.168.2.614.86.25.1
                                        Jan 14, 2025 20:58:14.032850981 CET50379445192.168.2.689.75.246.2
                                        Jan 14, 2025 20:58:14.032855988 CET50433445192.168.2.6177.147.64.3
                                        Jan 14, 2025 20:58:14.032877922 CET50428445192.168.2.638.202.131.1
                                        Jan 14, 2025 20:58:14.032908916 CET50327445192.168.2.626.197.227.1
                                        Jan 14, 2025 20:58:14.032996893 CET50336445192.168.2.649.158.7.1
                                        Jan 14, 2025 20:58:14.033036947 CET50348445192.168.2.6158.143.48.1
                                        Jan 14, 2025 20:58:14.033066034 CET50352445192.168.2.6116.178.208.1
                                        Jan 14, 2025 20:58:14.033109903 CET50359445192.168.2.618.241.31.1
                                        Jan 14, 2025 20:58:14.033138037 CET50370445192.168.2.672.217.90.2
                                        Jan 14, 2025 20:58:14.033149004 CET50362445192.168.2.649.79.158.2
                                        Jan 14, 2025 20:58:14.033198118 CET50364445192.168.2.6201.118.194.1
                                        Jan 14, 2025 20:58:14.033226013 CET50377445192.168.2.644.86.39.2
                                        Jan 14, 2025 20:58:14.033253908 CET50371445192.168.2.6116.90.121.1
                                        Jan 14, 2025 20:58:14.033288002 CET50382445192.168.2.6114.252.160.1
                                        Jan 14, 2025 20:58:14.033391953 CET50399445192.168.2.6194.163.210.1
                                        Jan 14, 2025 20:58:14.033478022 CET50450445192.168.2.612.102.130.2
                                        Jan 14, 2025 20:58:14.033514023 CET50527445192.168.2.653.130.241.1
                                        Jan 14, 2025 20:58:14.033560038 CET50469445192.168.2.6131.241.117.1
                                        Jan 14, 2025 20:58:14.033612013 CET50491445192.168.2.6193.228.157.3
                                        Jan 14, 2025 20:58:14.033695936 CET50511445192.168.2.698.102.89.2
                                        Jan 14, 2025 20:58:15.664417982 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:15.664489031 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:15.664570093 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:15.665851116 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:15.665867090 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.453968048 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.454083920 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:16.456398964 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:16.456410885 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.456800938 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.459028006 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:16.459093094 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:16.459099054 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.459233999 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:16.499334097 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.632059097 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.632268906 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:16.632366896 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:16.632653952 CET50637443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:16.632684946 CET4435063740.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:39.568202972 CET4970680192.168.2.62.23.77.188
                                        Jan 14, 2025 20:58:39.568301916 CET49703443192.168.2.640.126.32.72
                                        Jan 14, 2025 20:58:39.573297024 CET80497062.23.77.188192.168.2.6
                                        Jan 14, 2025 20:58:39.573375940 CET4970680192.168.2.62.23.77.188
                                        Jan 14, 2025 20:58:39.573471069 CET4434970340.126.32.72192.168.2.6
                                        Jan 14, 2025 20:58:39.573524952 CET49703443192.168.2.640.126.32.72
                                        Jan 14, 2025 20:58:42.114948988 CET49707443192.168.2.640.126.32.72
                                        Jan 14, 2025 20:58:42.312913895 CET4434970740.126.32.72192.168.2.6
                                        Jan 14, 2025 20:58:42.313036919 CET49707443192.168.2.640.126.32.72
                                        Jan 14, 2025 20:58:53.842154026 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:53.842207909 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:53.842521906 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:53.843096972 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:53.843112946 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.620146990 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.620215893 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:54.628264904 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:54.628294945 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.628603935 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.633480072 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:54.633610964 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:54.633620977 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.633857965 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:54.675333977 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.803750992 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.803848982 CET4435063940.113.103.199192.168.2.6
                                        Jan 14, 2025 20:58:54.803922892 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:54.804439068 CET50639443192.168.2.640.113.103.199
                                        Jan 14, 2025 20:58:54.804465055 CET4435063940.113.103.199192.168.2.6
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 20:57:07.396425009 CET5655753192.168.2.61.1.1.1
                                        Jan 14, 2025 20:57:07.405013084 CET53565571.1.1.1192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 14, 2025 20:57:07.396425009 CET192.168.2.61.1.1.10x220aStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 14, 2025 20:57:07.405013084 CET1.1.1.1192.168.2.60x220aNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                        Jan 14, 2025 20:57:07.405013084 CET1.1.1.1192.168.2.60x220aNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                        • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.649710104.16.167.228805896C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 20:57:07.417496920 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 20:57:07.895226955 CET778INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 19:57:07 GMT
                                        Content-Type: text/html
                                        Content-Length: 607
                                        Connection: close
                                        Server: cloudflare
                                        CF-RAY: 9020317bd8e442a9-EWR
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.649712104.16.167.228804208C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 20:57:08.288737059 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 20:57:08.781863928 CET778INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 19:57:08 GMT
                                        Content-Type: text/html
                                        Content-Length: 607
                                        Connection: close
                                        Server: cloudflare
                                        CF-RAY: 902031817b7cf3bb-EWR
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.649726104.16.167.228801924C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 20:57:09.380431890 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 20:57:09.842781067 CET778INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 19:57:09 GMT
                                        Content-Type: text/html
                                        Content-Length: 607
                                        Connection: close
                                        Server: cloudflare
                                        CF-RAY: 902031882d99f5f8-EWR
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                        Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                        Session IDSource IPSource PortDestination IPDestination Port
                                        0192.168.2.64970940.115.3.253443
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 19:57:04 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6c 79 6d 66 4f 43 34 59 37 45 79 68 33 72 55 66 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 31 35 64 33 64 35 39 37 36 39 64 32 34 62 39 0d 0a 0d 0a
                                        Data Ascii: CNT 1 CON 305MS-CV: lymfOC4Y7Eyh3rUf.1Context: a15d3d59769d24b9
                                        2025-01-14 19:57:04 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                        2025-01-14 19:57:04 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6c 79 6d 66 4f 43 34 59 37 45 79 68 33 72 55 66 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 31 35 64 33 64 35 39 37 36 39 64 32 34 62 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 32 38 61 71 61 2b 59 31 32 54 4a 69 33 32 7a 50 47 62 55 56 32 2b 6a 58 44 2f 74 51 66 77 53 70 6e 56 63 69 70 77 74 49 49 79 37 46 58 4f 4f 5a 35 78 4a 51 4c 42 57 62 41 75 45 67 79 2b 68 57 68 68 6a 62 76 77 66 54 30 75 2f 79 54 51 78 54 49 38 6d 58 50 70 7a 43 49 6d 70 67 4a 35 47 53 59 47 6b 59 77 6a 63 4b 33 68 48 30
                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: lymfOC4Y7Eyh3rUf.2Context: a15d3d59769d24b9<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAV28aqa+Y12TJi32zPGbUV2+jXD/tQfwSpnVcipwtIIy7FXOOZ5xJQLBWbAuEgy+hWhhjbvwfT0u/yTQxTI8mXPpzCImpgJ5GSYGkYwjcK3hH0
                                        2025-01-14 19:57:04 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6c 79 6d 66 4f 43 34 59 37 45 79 68 33 72 55 66 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 31 35 64 33 64 35 39 37 36 39 64 32 34 62 39 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: lymfOC4Y7Eyh3rUf.3Context: a15d3d59769d24b9<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                        2025-01-14 19:57:04 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                        Data Ascii: 202 1 CON 58
                                        2025-01-14 19:57:04 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6b 59 5a 30 5a 42 47 44 33 45 79 6c 30 47 72 44 57 37 48 4f 47 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                        Data Ascii: MS-CV: kYZ0ZBGD3Eyl0GrDW7HOGQ.0Payload parsing failed.


                                        Session IDSource IPSource PortDestination IPDestination Port
                                        1192.168.2.64975240.113.110.67443
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 19:57:12 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 30 4a 41 4f 47 78 63 36 6d 30 4f 68 46 6c 65 45 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 39 31 64 64 66 36 35 61 61 64 37 38 64 66 64 66 0d 0a 0d 0a
                                        Data Ascii: CNT 1 CON 305MS-CV: 0JAOGxc6m0OhFleE.1Context: 91ddf65aad78dfdf
                                        2025-01-14 19:57:12 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                        2025-01-14 19:57:12 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 30 4a 41 4f 47 78 63 36 6d 30 4f 68 46 6c 65 45 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 39 31 64 64 66 36 35 61 61 64 37 38 64 66 64 66 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 32 38 61 71 61 2b 59 31 32 54 4a 69 33 32 7a 50 47 62 55 56 32 2b 6a 58 44 2f 74 51 66 77 53 70 6e 56 63 69 70 77 74 49 49 79 37 46 58 4f 4f 5a 35 78 4a 51 4c 42 57 62 41 75 45 67 79 2b 68 57 68 68 6a 62 76 77 66 54 30 75 2f 79 54 51 78 54 49 38 6d 58 50 70 7a 43 49 6d 70 67 4a 35 47 53 59 47 6b 59 77 6a 63 4b 33 68 48 30
                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 0JAOGxc6m0OhFleE.2Context: 91ddf65aad78dfdf<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAV28aqa+Y12TJi32zPGbUV2+jXD/tQfwSpnVcipwtIIy7FXOOZ5xJQLBWbAuEgy+hWhhjbvwfT0u/yTQxTI8mXPpzCImpgJ5GSYGkYwjcK3hH0
                                        2025-01-14 19:57:12 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 30 4a 41 4f 47 78 63 36 6d 30 4f 68 46 6c 65 45 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 39 31 64 64 66 36 35 61 61 64 37 38 64 66 64 66 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: 0JAOGxc6m0OhFleE.3Context: 91ddf65aad78dfdf<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                        2025-01-14 19:57:12 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                        Data Ascii: 202 1 CON 58
                                        2025-01-14 19:57:12 UTC58INData Raw: 4d 53 2d 43 56 3a 20 45 65 4a 2f 30 77 61 51 56 45 79 42 4e 58 6a 6f 49 70 63 30 5a 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                        Data Ascii: MS-CV: EeJ/0waQVEyBNXjoIpc0Zw.0Payload parsing failed.


                                        Session IDSource IPSource PortDestination IPDestination Port
                                        2192.168.2.64999040.113.110.67443
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 19:57:25 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 31 59 47 53 50 68 77 2f 45 55 47 4f 6f 45 52 30 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 31 63 62 35 33 33 36 31 33 61 33 64 62 34 62 0d 0a 0d 0a
                                        Data Ascii: CNT 1 CON 305MS-CV: 1YGSPhw/EUGOoER0.1Context: c1cb533613a3db4b
                                        2025-01-14 19:57:25 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                        2025-01-14 19:57:25 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 31 59 47 53 50 68 77 2f 45 55 47 4f 6f 45 52 30 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 31 63 62 35 33 33 36 31 33 61 33 64 62 34 62 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 32 38 61 71 61 2b 59 31 32 54 4a 69 33 32 7a 50 47 62 55 56 32 2b 6a 58 44 2f 74 51 66 77 53 70 6e 56 63 69 70 77 74 49 49 79 37 46 58 4f 4f 5a 35 78 4a 51 4c 42 57 62 41 75 45 67 79 2b 68 57 68 68 6a 62 76 77 66 54 30 75 2f 79 54 51 78 54 49 38 6d 58 50 70 7a 43 49 6d 70 67 4a 35 47 53 59 47 6b 59 77 6a 63 4b 33 68 48 30
                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 1YGSPhw/EUGOoER0.2Context: c1cb533613a3db4b<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAV28aqa+Y12TJi32zPGbUV2+jXD/tQfwSpnVcipwtIIy7FXOOZ5xJQLBWbAuEgy+hWhhjbvwfT0u/yTQxTI8mXPpzCImpgJ5GSYGkYwjcK3hH0
                                        2025-01-14 19:57:25 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 31 59 47 53 50 68 77 2f 45 55 47 4f 6f 45 52 30 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 31 63 62 35 33 33 36 31 33 61 33 64 62 34 62 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: 1YGSPhw/EUGOoER0.3Context: c1cb533613a3db4b<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                        2025-01-14 19:57:26 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                        Data Ascii: 202 1 CON 58
                                        2025-01-14 19:57:26 UTC58INData Raw: 4d 53 2d 43 56 3a 20 46 69 5a 31 73 6a 50 63 49 55 71 50 52 66 59 34 67 32 52 41 69 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                        Data Ascii: MS-CV: FiZ1sjPcIUqPRfY4g2RAiw.0Payload parsing failed.


                                        Session IDSource IPSource PortDestination IPDestination Port
                                        3192.168.2.65023240.113.103.199443
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 19:57:46 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 74 70 33 34 37 33 59 6e 71 6b 69 47 4f 77 7a 72 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 39 65 65 64 66 35 31 63 36 38 33 33 66 36 36 0d 0a 0d 0a
                                        Data Ascii: CNT 1 CON 305MS-CV: tp3473YnqkiGOwzr.1Context: d9eedf51c6833f66
                                        2025-01-14 19:57:46 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                        2025-01-14 19:57:46 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 74 70 33 34 37 33 59 6e 71 6b 69 47 4f 77 7a 72 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 39 65 65 64 66 35 31 63 36 38 33 33 66 36 36 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 32 38 61 71 61 2b 59 31 32 54 4a 69 33 32 7a 50 47 62 55 56 32 2b 6a 58 44 2f 74 51 66 77 53 70 6e 56 63 69 70 77 74 49 49 79 37 46 58 4f 4f 5a 35 78 4a 51 4c 42 57 62 41 75 45 67 79 2b 68 57 68 68 6a 62 76 77 66 54 30 75 2f 79 54 51 78 54 49 38 6d 58 50 70 7a 43 49 6d 70 67 4a 35 47 53 59 47 6b 59 77 6a 63 4b 33 68 48 30
                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: tp3473YnqkiGOwzr.2Context: d9eedf51c6833f66<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAV28aqa+Y12TJi32zPGbUV2+jXD/tQfwSpnVcipwtIIy7FXOOZ5xJQLBWbAuEgy+hWhhjbvwfT0u/yTQxTI8mXPpzCImpgJ5GSYGkYwjcK3hH0
                                        2025-01-14 19:57:46 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 74 70 33 34 37 33 59 6e 71 6b 69 47 4f 77 7a 72 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 39 65 65 64 66 35 31 63 36 38 33 33 66 36 36 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: tp3473YnqkiGOwzr.3Context: d9eedf51c6833f66<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                        2025-01-14 19:57:46 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                        Data Ascii: 202 1 CON 58
                                        2025-01-14 19:57:46 UTC58INData Raw: 4d 53 2d 43 56 3a 20 2b 35 36 42 49 77 47 2b 37 45 53 2f 4c 74 54 50 6a 62 4d 4a 32 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                        Data Ascii: MS-CV: +56BIwG+7ES/LtTPjbMJ2g.0Payload parsing failed.


                                        Session IDSource IPSource PortDestination IPDestination Port
                                        4192.168.2.65063740.113.103.199443
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 19:58:16 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6d 6d 79 65 59 4c 55 70 63 45 61 50 7a 72 38 6e 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 64 62 38 63 39 63 61 66 63 64 61 36 34 33 66 0d 0a 0d 0a
                                        Data Ascii: CNT 1 CON 305MS-CV: mmyeYLUpcEaPzr8n.1Context: cdb8c9cafcda643f
                                        2025-01-14 19:58:16 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                        2025-01-14 19:58:16 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6d 6d 79 65 59 4c 55 70 63 45 61 50 7a 72 38 6e 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 64 62 38 63 39 63 61 66 63 64 61 36 34 33 66 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 32 38 61 71 61 2b 59 31 32 54 4a 69 33 32 7a 50 47 62 55 56 32 2b 6a 58 44 2f 74 51 66 77 53 70 6e 56 63 69 70 77 74 49 49 79 37 46 58 4f 4f 5a 35 78 4a 51 4c 42 57 62 41 75 45 67 79 2b 68 57 68 68 6a 62 76 77 66 54 30 75 2f 79 54 51 78 54 49 38 6d 58 50 70 7a 43 49 6d 70 67 4a 35 47 53 59 47 6b 59 77 6a 63 4b 33 68 48 30
                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: mmyeYLUpcEaPzr8n.2Context: cdb8c9cafcda643f<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAV28aqa+Y12TJi32zPGbUV2+jXD/tQfwSpnVcipwtIIy7FXOOZ5xJQLBWbAuEgy+hWhhjbvwfT0u/yTQxTI8mXPpzCImpgJ5GSYGkYwjcK3hH0
                                        2025-01-14 19:58:16 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6d 6d 79 65 59 4c 55 70 63 45 61 50 7a 72 38 6e 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 64 62 38 63 39 63 61 66 63 64 61 36 34 33 66 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: mmyeYLUpcEaPzr8n.3Context: cdb8c9cafcda643f<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                        2025-01-14 19:58:16 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                        Data Ascii: 202 1 CON 58
                                        2025-01-14 19:58:16 UTC58INData Raw: 4d 53 2d 43 56 3a 20 73 63 6e 61 5a 42 73 79 6b 30 69 43 6f 57 49 6a 53 75 78 39 33 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                        Data Ascii: MS-CV: scnaZBsyk0iCoWIjSux93A.0Payload parsing failed.


                                        Session IDSource IPSource PortDestination IPDestination Port
                                        5192.168.2.65063940.113.103.199443
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 19:58:54 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 64 7a 54 4f 47 51 76 71 79 45 6d 6b 76 38 79 4c 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 61 31 39 36 39 33 37 34 38 66 36 66 30 39 34 0d 0a 0d 0a
                                        Data Ascii: CNT 1 CON 305MS-CV: dzTOGQvqyEmkv8yL.1Context: 4a19693748f6f094
                                        2025-01-14 19:58:54 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                        2025-01-14 19:58:54 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 64 7a 54 4f 47 51 76 71 79 45 6d 6b 76 38 79 4c 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 61 31 39 36 39 33 37 34 38 66 36 66 30 39 34 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 32 38 61 71 61 2b 59 31 32 54 4a 69 33 32 7a 50 47 62 55 56 32 2b 6a 58 44 2f 74 51 66 77 53 70 6e 56 63 69 70 77 74 49 49 79 37 46 58 4f 4f 5a 35 78 4a 51 4c 42 57 62 41 75 45 67 79 2b 68 57 68 68 6a 62 76 77 66 54 30 75 2f 79 54 51 78 54 49 38 6d 58 50 70 7a 43 49 6d 70 67 4a 35 47 53 59 47 6b 59 77 6a 63 4b 33 68 48 30
                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: dzTOGQvqyEmkv8yL.2Context: 4a19693748f6f094<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAV28aqa+Y12TJi32zPGbUV2+jXD/tQfwSpnVcipwtIIy7FXOOZ5xJQLBWbAuEgy+hWhhjbvwfT0u/yTQxTI8mXPpzCImpgJ5GSYGkYwjcK3hH0
                                        2025-01-14 19:58:54 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 64 7a 54 4f 47 51 76 71 79 45 6d 6b 76 38 79 4c 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 61 31 39 36 39 33 37 34 38 66 36 66 30 39 34 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: dzTOGQvqyEmkv8yL.3Context: 4a19693748f6f094<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                        2025-01-14 19:58:54 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                        Data Ascii: 202 1 CON 58
                                        2025-01-14 19:58:54 UTC58INData Raw: 4d 53 2d 43 56 3a 20 42 31 4e 6f 42 58 2b 77 35 6b 2b 4a 35 6c 6b 78 53 37 41 31 72 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                        Data Ascii: MS-CV: B1NoBX+w5k+J5lkxS7A1rg.0Payload parsing failed.


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:14:57:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\loaddll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:loaddll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll"
                                        Imagebase:0x100000
                                        File size:126'464 bytes
                                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:1
                                        Start time:14:57:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:14:57:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1
                                        Imagebase:0x1c0000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:14:57:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe C:\Users\user\Desktop\mCgW5qofxC.dll,PlayGame
                                        Imagebase:0x240000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:14:57:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",#1
                                        Imagebase:0x240000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:14:57:05
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:FC9B6711FD800ECCBF960932F0E9B75B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2184434328.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2184692680.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.2184692680.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 100%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:8
                                        Start time:14:57:07
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:FC9B6711FD800ECCBF960932F0E9B75B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2852248132.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2852248132.00000000023DE000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2200457017.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2200675746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2200675746.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2848443868.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2848443868.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Target ID:9
                                        Start time:14:57:08
                                        Start date:14/01/2025
                                        Path:C:\Windows\tasksche.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                        Imagebase:0x400000
                                        File size:3'514'368 bytes
                                        MD5 hash:16A8FDD68114C10EAE3C843FAFF5916B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.2209536984.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                        • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 94%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:10
                                        Start time:14:57:08
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\mCgW5qofxC.dll",PlayGame
                                        Imagebase:0x240000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:14:57:08
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:FC9B6711FD800ECCBF960932F0E9B75B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.2212468574.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.2212468574.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.2221303870.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.2211938201.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.2221455318.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.2221455318.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Target ID:12
                                        Start time:14:57:09
                                        Start date:14/01/2025
                                        Path:C:\Windows\tasksche.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\WINDOWS\tasksche.exe /i
                                        Imagebase:0x400000
                                        File size:3'514'368 bytes
                                        MD5 hash:16A8FDD68114C10EAE3C843FAFF5916B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.2220670094.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.2220295913.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:71.8%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:64.9%
                                          Total number of Nodes:37
                                          Total number of Limit Nodes:9

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F940EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                          • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                          • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                          • CreateProcessA.KERNELBASE ref: 00407EE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                          • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2210313922.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2210233834.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210336557.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210432736.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4281112323-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2210313922.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2210233834.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210336557.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210432736.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2210313922.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2210233834.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210336557.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210432736.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                          • API String ID: 774561529-2942426231
                                          • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                          • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F940EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2210313922.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2210233834.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210336557.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210432736.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                          • API String ID: 3340711343-4063779371
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F940EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2210313922.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2210233834.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210336557.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210360491.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210432736.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2210521733.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.0
                                          • API String ID: 4274534310-3729025388
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Execution Graph

                                          Execution Coverage:34.9%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:0%
                                          Total number of Nodes:35
                                          Total number of Limit Nodes:2

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F940EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2846322215.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2846304244.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846339586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846422098.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846547321.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.0
                                          • API String ID: 4274534310-3729025388
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2846322215.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2846304244.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846339586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846422098.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846547321.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                          • API String ID: 774561529-2942426231
                                          • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                          • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F940EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2846322215.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2846304244.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846339586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846422098.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846547321.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                          • API String ID: 3340711343-4063779371
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F940EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2846322215.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2846304244.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846339586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846422098.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846547321.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4072214828-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2846322215.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000008.00000002.2846304244.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846339586.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846354979.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846407296.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846422098.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846547321.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000008.00000002.2846653961.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                          APIs
                                          • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: /../$/..\$\../$\..\
                                          • API String ID: 3510742995-3885502717
                                          • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                          • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                          • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                          • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                          APIs
                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                          • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                          • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                          • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                          • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                          • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                          • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                          • API String ID: 2238633743-2459060434
                                          • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                          • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                          • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                          • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                          APIs
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                          • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                          • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$ManagerStart
                                          • String ID: cmd.exe /c "%s"
                                          • API String ID: 1485051382-955883872
                                          • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                          • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                          • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                          • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                          • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                          • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                          • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrow$memcpy
                                          • String ID:
                                          • API String ID: 1881450474-3916222277
                                          • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                          • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                          • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                          • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                          APIs
                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                          • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                          • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                          • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                          • String ID: WANACRY!
                                          • API String ID: 283026544-1240840912
                                          • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                          • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                          • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                          • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                          • String ID: $Q;@
                                          • API String ID: 2382887404-262343263
                                          • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                          • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                          • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                          • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                          • String ID:
                                          • API String ID: 2382887404-3916222277
                                          • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                          • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                          • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                          • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                          APIs
                                          • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                          • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                          • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$FreeProcessfree
                                          • String ID:
                                          • API String ID: 3428986607-0
                                          • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                          • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                          • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                          • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrow
                                          • String ID:
                                          • API String ID: 941485209-0
                                          • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                          • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                          • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                          • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrow
                                          • String ID:
                                          • API String ID: 941485209-0
                                          • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                          • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                          • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                          • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: memcpy
                                          • String ID:
                                          • API String ID: 3510742995-0
                                          • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                          • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                          • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                          • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                          APIs
                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ContextCryptRelease
                                          • String ID:
                                          • API String ID: 829835001-0
                                          • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                          • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                          • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                          • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                          • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                          • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                          • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                          • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                          • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                          • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                          APIs
                                            • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                            • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                          • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                          • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                          • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                          • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                          • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                          • API String ID: 2238633743-1294736154
                                          • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                          • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                          • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                          • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: %s%s$%s%s%s$:$\
                                          • API String ID: 0-1100577047
                                          • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                          • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                          • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                          • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                          APIs
                                          • __p___argv.MSVCRT(0040F538), ref: 00402040
                                          • strcmp.MSVCRT(?), ref: 0040204B
                                          • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                          • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                            • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                          • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                          • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                          • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                            • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                            • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                            • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                            • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                          • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                          • API String ID: 1074704982-2844324180
                                          • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                          • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                          • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                          • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                          APIs
                                          • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                          • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                          • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                          • strlen.MSVCRT(?), ref: 004011A7
                                          • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                          • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                          • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                          • String ID: 0@$Software\$WanaCrypt0r
                                          • API String ID: 865909632-3421300005
                                          • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                          • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                          • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                          • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                          • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                          • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                          • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                          • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                            • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                            • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                          • String ID: %s\Intel$%s\ProgramData
                                          • API String ID: 3806094219-198707228
                                          • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                          • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                          • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                          • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                          APIs
                                            • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                          • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                          • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                          • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                            • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                          • SetLastError.KERNEL32(0000045A), ref: 00402430
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                          • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                          • API String ID: 1900561814-3657104962
                                          • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                          • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                          • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                          • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                          APIs
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                          • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                          • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                          • String ID: %s\%s
                                          • API String ID: 1036847564-4073750446
                                          • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                          • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                          • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                          • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                          APIs
                                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                          • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                          • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                          • CloseHandle.KERNEL32(?), ref: 004010EC
                                          • CloseHandle.KERNEL32(?), ref: 004010F1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                          • String ID: D
                                          • API String ID: 786732093-2746444292
                                          • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                          • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                          • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                          • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                          APIs
                                          • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                          • __p__fmode.MSVCRT ref: 004077FC
                                          • __p__commode.MSVCRT ref: 0040780A
                                          • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                          • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                          • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                          • String ID:
                                          • API String ID: 3626615345-0
                                          • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                          • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                          • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                          • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                          APIs
                                          • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                            • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                          • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                          • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                          • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                          • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                          • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                          • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                          • String ID:
                                          • API String ID: 2141228402-0
                                          • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                          • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                          • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                          • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                          APIs
                                          • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                          • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                          • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Read$realloc
                                          • String ID: ?!@
                                          • API String ID: 1241503663-708128716
                                          • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                          • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                          • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                          • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: rand$wcslen$ComputerNamesrand
                                          • String ID:
                                          • API String ID: 3058258771-0
                                          • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                          • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                          • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                          • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                          APIs
                                          • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                          • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                          • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                          • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                          • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                          • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                          • String ID:
                                          • API String ID: 2935503933-0
                                          • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                          • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                          • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                          • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                          APIs
                                          • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                          • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                          • Sleep.KERNEL32(000003E8), ref: 00401F40
                                          • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandleMutexOpenSleepsprintf
                                          • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                          • API String ID: 2780352083-2959021817
                                          • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                          • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                          • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                          • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                          APIs
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                          • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                          • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??0exception@@ExceptionThrowmemcpy
                                          • String ID:
                                          • API String ID: 2382887404-0
                                          • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                          • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                          • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                          • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                          APIs
                                          • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                          • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                          • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                          • fclose.MSVCRT(00000000), ref: 00401058
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: fclosefopenfreadfwrite
                                          • String ID: c.wnry
                                          • API String ID: 4000964834-3240288721
                                          • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                          • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                          • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                          • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                          APIs
                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                          • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                          • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                          • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                          • String ID:
                                          • API String ID: 2811923685-0
                                          • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                          • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                          • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                          • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                          APIs
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                          • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Pointer$??2@Create
                                          • String ID:
                                          • API String ID: 1331958074-0
                                          • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                          • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                          • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                          • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                          APIs
                                          • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                          • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_stricmp
                                          • String ID: P!@
                                          • API String ID: 1278613211-1774101457
                                          • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                          • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                          • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                          • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                          APIs
                                          • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                          • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AttributesFilestrcmp
                                          • String ID: c.wnry
                                          • API String ID: 3324900478-3240288721
                                          • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                          • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                          • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                          • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                          APIs
                                          • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                          • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??3@CloseHandle
                                          • String ID: $l@
                                          • API String ID: 3816424416-2140230165
                                          • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                          • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                          • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                          • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                          • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                          • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2209907174.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000009.00000002.2209891624.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209924244.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209940443.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000009.00000002.2209956155.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$Leave$Entermemcpy
                                          • String ID:
                                          • API String ID: 3435569088-0
                                          • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                          • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                          • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                          • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65