Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
87c6RORO31.dll

Overview

General Information

Sample name:87c6RORO31.dll
renamed because original name is a hash value
Original sample name:7d4c4401e1fe00bc5f751ddfabcf0e8d.dll
Analysis ID:1591285
MD5:7d4c4401e1fe00bc5f751ddfabcf0e8d
SHA1:f605c351811668526456a1832bad7973605e2af1
SHA256:d388424c0a34f9d700cbafb96839f09a945d12d34b457cd64b4e82738fcf8801
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5000 cmdline: loaddll32.exe "C:\Users\user\Desktop\87c6RORO31.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6216 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 3940 cmdline: rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1396 cmdline: rundll32.exe C:\Users\user\Desktop\87c6RORO31.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 6600 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 47FE23C22356C88404A7B0B9A508EFFB)
        • tasksche.exe (PID: 2304 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 087BE2D4C652DD35156789E4044A5815)
    • rundll32.exe (PID: 2680 cmdline: rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 1584 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 47FE23C22356C88404A7B0B9A508EFFB)
        • tasksche.exe (PID: 3152 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 087BE2D4C652DD35156789E4044A5815)
  • mssecsvc.exe (PID: 6036 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 47FE23C22356C88404A7B0B9A508EFFB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
87c6RORO31.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    87c6RORO31.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    87c6RORO31.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        0000000C.00000002.2181441896.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        0000000B.00000002.2185941347.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000B.00000000.2171132694.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvc.exe.1d6b084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              11.2.mssecsvc.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                11.2.mssecsvc.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                11.2.mssecsvc.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                11.2.mssecsvc.exe.7100a4.1.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
                • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
                • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
                Click to see the 135 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:15:39.323066+010020315153Misc activity104.16.166.22880192.168.2.649709TCP
                2025-01-14T21:15:40.422953+010020315153Misc activity104.16.166.22880192.168.2.649711TCP
                2025-01-14T21:15:41.689013+010020315153Misc activity104.16.166.22880192.168.2.649728TCP
                2025-01-14T21:17:46.516405+010020315153Misc activity104.16.166.22880192.168.2.650642TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:15:38.804144+010020242911A Network Trojan was detected192.168.2.6626851.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:15:39.317920+010020242981A Network Trojan was detected192.168.2.649709104.16.166.22880TCP
                2025-01-14T21:15:40.422926+010020242981A Network Trojan was detected192.168.2.649711104.16.166.22880TCP
                2025-01-14T21:15:41.688897+010020242981A Network Trojan was detected192.168.2.649728104.16.166.22880TCP
                2025-01-14T21:17:46.511479+010020242981A Network Trojan was detected192.168.2.650642104.16.166.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:15:39.317920+010020242991A Network Trojan was detected192.168.2.649709104.16.166.22880TCP
                2025-01-14T21:15:40.422926+010020242991A Network Trojan was detected192.168.2.649711104.16.166.22880TCP
                2025-01-14T21:15:41.688897+010020242991A Network Trojan was detected192.168.2.649728104.16.166.22880TCP
                2025-01-14T21:17:46.511479+010020242991A Network Trojan was detected192.168.2.650642104.16.166.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:15:39.317920+010020243011A Network Trojan was detected192.168.2.649709104.16.166.22880TCP
                2025-01-14T21:15:40.422926+010020243011A Network Trojan was detected192.168.2.649711104.16.166.22880TCP
                2025-01-14T21:15:41.688897+010020243011A Network Trojan was detected192.168.2.649728104.16.166.22880TCP
                2025-01-14T21:17:46.511479+010020243011A Network Trojan was detected192.168.2.650642104.16.166.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:15:39.317920+010020243021A Network Trojan was detected192.168.2.649709104.16.166.22880TCP
                2025-01-14T21:15:40.422926+010020243021A Network Trojan was detected192.168.2.649711104.16.166.22880TCP
                2025-01-14T21:15:41.688897+010020243021A Network Trojan was detected192.168.2.649728104.16.166.22880TCP
                2025-01-14T21:17:46.511479+010020243021A Network Trojan was detected192.168.2.650642104.16.166.22880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T21:15:39.317920+010028033043Unknown Traffic192.168.2.649709104.16.166.22880TCP
                2025-01-14T21:15:40.422926+010028033043Unknown Traffic192.168.2.649711104.16.166.22880TCP
                2025-01-14T21:15:41.688897+010028033043Unknown Traffic192.168.2.649728104.16.166.22880TCP
                2025-01-14T21:17:46.511479+010028033043Unknown Traffic192.168.2.650642104.16.166.22880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 87c6RORO31.dllAvira: detected
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 100%
                Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 100%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
                Source: 87c6RORO31.dllVirustotal: Detection: 82%Perma Link
                Source: 87c6RORO31.dllReversingLabs: Detection: 94%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                Source: 87c6RORO31.dllJoe Sandbox ML: detected
                Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: 87c6RORO31.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49946 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49825 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50054 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50265 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50639 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50641 version: TLS 1.2

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49711 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49711 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49711 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49711 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49709 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49709 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49709 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49709 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:49728 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:49728 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:49728 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:49728 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.6:50642 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.6:50642 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.6:50642 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.6:50642 -> 104.16.166.228:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:15:39 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90204c9e4afa7286-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:15:40 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90204ca52ed372b7-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:15:41 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90204cad18a84402-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 20:17:46 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 90204fb91b353320-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                Source: unknownNetwork traffic detected: IP country count 11
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49711 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.6:49711
                Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.6:62685 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49709 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49728 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.6:49709
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.6:49728
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:50642 -> 104.16.166.228:80
                Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.166.228:80 -> 192.168.2.6:50642
                Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49946 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.93
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.93
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.93
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.93
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.1
                Source: unknownTCP traffic detected without corresponding DNS query: 153.163.31.1
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.209
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.209
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.209
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.209
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 151.121.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.113
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.113
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.113
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.1
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.113
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.1
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.1
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.1
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.1
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.1
                Source: unknownTCP traffic detected without corresponding DNS query: 155.86.254.1
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.213
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.213
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.213
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.1
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.213
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.1
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.1
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.1
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.1
                Source: unknownTCP traffic detected without corresponding DNS query: 44.206.62.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                Source: mssecsvc.exe, 00000008.00000002.2806420955.0000000000C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com.
                Source: mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                Source: mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/.
                Source: mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                Source: mssecsvc.exe, 00000006.00000002.2168647260.0000000000C5F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2168647260.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/p
                Source: mssecsvc.exe, 00000008.00000002.2806420955.0000000000C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s
                Source: mssecsvc.exe, 00000008.00000002.2806420955.0000000000C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/sI
                Source: mssecsvc.exe, 00000008.00000002.2805451480.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
                Source: mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comV
                Source: mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comck
                Source: mssecsvc.exe, 00000006.00000002.2168647260.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comh
                Source: mssecsvc.exe, 00000008.00000002.2806420955.0000000000D0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49946 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50639
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50054
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50054 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50265
                Source: unknownNetwork traffic detected: HTTP traffic on port 50639 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50641
                Source: unknownNetwork traffic detected: HTTP traffic on port 50265 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50641 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49825 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50054 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50265 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50639 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:50641 version: TLS 1.2

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
                Source: Yara matchFile source: 87c6RORO31.dll, type: SAMPLE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1d9d128.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.22be96c.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1d9d128.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.22be96c.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.229b948.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.228c8c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1d7a104.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1d760a4.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.229b948.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.1d7a104.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.22978e8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.2185941347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.2171132694.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2142701735.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2168056567.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.2156359145.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2807120127.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2186106362.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.2171283947.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.2157691888.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2142847063.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2807700303.000000000229B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 6036, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1584, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                System Summary

                barindex
                Source: 87c6RORO31.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 87c6RORO31.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1d6b084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1d9d128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1d9d128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1d9d128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.228c8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.22be96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.22be96c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.22be96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1d9d128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1d9d128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1d9d128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.22be96c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.22be96c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.22be96c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.229b948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.229b948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.229b948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.228c8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.228c8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1d7a104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1d7a104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1d7a104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvc.exe.1d760a4.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1d760a4.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.229b948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.229b948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.1d7a104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.1d7a104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.22978e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.22978e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000002.2181441896.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000C.00000000.2179903924.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.2166950292.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2807120127.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000002.2186106362.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000B.00000000.2171283947.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.2157691888.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.2142847063.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2807700303.000000000229B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
                Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
                Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
                Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
                Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
                Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
                Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
                Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                Source: 87c6RORO31.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: 87c6RORO31.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 87c6RORO31.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1d6b084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1d9d128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1d9d128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1d9d128.5.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.228c8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.22be96c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.22be96c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.22be96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1d9d128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1d9d128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1d9d128.5.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.22be96c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.22be96c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.22be96c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.229b948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.229b948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.229b948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.228c8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.228c8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1d7a104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1d7a104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1d7a104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1d6b084.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvc.exe.1d760a4.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1d760a4.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.229b948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.229b948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.1d7a104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.1d7a104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.22978e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.22978e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000002.2181441896.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000C.00000000.2179903924.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.2166950292.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2807120127.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000002.2186106362.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000B.00000000.2171283947.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.2157691888.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.2142847063.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2807700303.000000000229B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: tasksche.exe, 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.2181441896.000000000040E000.00000008.00000001.01000000.00000007.sdmp, 87c6RORO31.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@1/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6228:120:WilError_03
                Source: 87c6RORO31.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\87c6RORO31.dll,PlayGame
                Source: 87c6RORO31.dllVirustotal: Detection: 82%
                Source: 87c6RORO31.dllReversingLabs: Detection: 94%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\87c6RORO31.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\87c6RORO31.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\87c6RORO31.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: 87c6RORO31.dllStatic file information: File size 5267459 > 1048576
                Source: 87c6RORO31.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
                Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 6404Thread sleep count: 95 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 6404Thread sleep time: -190000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 6872Thread sleep count: 132 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 6872Thread sleep count: 35 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 6404Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
                Source: mssecsvc.exe, 00000006.00000002.2168647260.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2168647260.0000000000C1E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2806420955.0000000000D1F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2806420955.0000000000C98000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2806420955.0000000000CBB000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
                Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1Jump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote Services1
                Archive Collected Data
                22
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media11
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS2
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591285 Sample: 87c6RORO31.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 61 Tries to download HTTP data from a sinkholed server 2->61 63 Suricata IDS alerts for network traffic 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 6 other signatures 2->67 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        17 rundll32.exe 9->17         started        20 cmd.exe 1 9->20         started        22 conhost.exe 9->22         started        45 192.168.2.102 unknown unknown 11->45 47 192.168.2.103 unknown unknown 11->47 49 98 other IPs or domains 11->49 77 Connects to many different private IPs via SMB (likely to spread or exploit) 11->77 79 Connects to many different private IPs (likely to spread or exploit) 11->79 signatures6 process7 signatures8 24 mssecsvc.exe 7 15->24         started        59 Drops executables to the windows directory (C:\Windows) and starts them 17->59 28 mssecsvc.exe 7 17->28         started        30 rundll32.exe 1 20->30         started        process9 file10 37 C:\Windows\tasksche.exe, PE32 24->37 dropped 69 Antivirus detection for dropped file 24->69 71 Multi AV Scanner detection for dropped file 24->71 73 Machine Learning detection for dropped file 24->73 32 tasksche.exe 24->32         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 28->39 dropped 75 Drops executables to the windows directory (C:\Windows) and starts them 28->75 35 tasksche.exe 28->35         started        41 C:\Windows\mssecsvc.exe, PE32 30->41 dropped signatures11 process12 signatures13 51 Detected Wannacry Ransomware 32->51 53 Antivirus detection for dropped file 32->53 55 Multi AV Scanner detection for dropped file 32->55 57 Machine Learning detection for dropped file 32->57

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                87c6RORO31.dll83%VirustotalBrowse
                87c6RORO31.dll95%ReversingLabsWin32.Ransomware.WannaCry
                87c6RORO31.dll100%AviraTR/Ransom.Gen
                87c6RORO31.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
                C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)100%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\mssecsvc.exe100%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com.0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
                https://www.kryptoslogic.com0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comck0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comV0%Avira URL Cloudsafe
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comh0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                104.16.166.228
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.commssecsvc.exe.4.drfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/smssecsvc.exe, 00000008.00000002.2806420955.0000000000C98000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/pmssecsvc.exe, 00000006.00000002.2168647260.0000000000C5F000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2168647260.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com.mssecsvc.exe, 00000008.00000002.2806420955.0000000000C98000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/.mssecsvc.exe, 0000000B.00000002.2187146818.0000000000C5D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comVmssecsvc.exe, 0000000B.00000002.2187146818.0000000000C28000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.kryptoslogic.commssecsvc.exe, 00000008.00000002.2806420955.0000000000D0A000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 0000000B.00000002.2187146818.0000000000C28000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comckmssecsvc.exe, 0000000B.00000002.2187146818.0000000000C5D000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comhmssecsvc.exe, 00000006.00000002.2168647260.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/sImssecsvc.exe, 00000008.00000002.2806420955.0000000000C98000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2805451480.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                77.250.55.206
                                unknownNetherlands
                                6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
                                44.206.62.213
                                unknownUnited States
                                14618AMAZON-AESUSfalse
                                84.23.243.1
                                unknownGermany
                                34171INTERDOTNET-LIG-ASDEfalse
                                49.6.27.1
                                unknownChina
                                55990HWCSNETHuaweiCloudServicedatacenterCNfalse
                                200.186.41.185
                                unknownBrazil
                                3549LVLT-3549USfalse
                                44.206.62.1
                                unknownUnited States
                                14618AMAZON-AESUSfalse
                                215.136.68.134
                                unknownUnited States
                                721DNIC-ASBLK-00721-00726USfalse
                                44.206.62.2
                                unknownUnited States
                                14618AMAZON-AESUSfalse
                                26.28.204.104
                                unknownUnited States
                                7922COMCAST-7922USfalse
                                91.135.242.2
                                unknownAzerbaijan
                                34170AS-AZTELEKOMAzerbaijanTelecomunicationISPAZfalse
                                91.135.242.1
                                unknownAzerbaijan
                                34170AS-AZTELEKOMAzerbaijanTelecomunicationISPAZfalse
                                52.131.121.1
                                unknownChina
                                58593BLUECLOUDShanghaiBlueCloudTechnologyCoLtdCNfalse
                                52.95.229.1
                                unknownUnited States
                                16509AMAZON-02USfalse
                                62.31.110.70
                                unknownUnited Kingdom
                                5089NTLGBfalse
                                80.105.222.1
                                unknownItaly
                                3269ASN-IBSNAZITfalse
                                52.95.229.127
                                unknownUnited States
                                16509AMAZON-02USfalse
                                189.143.20.0
                                unknownMexico
                                8151UninetSAdeCVMXfalse
                                189.143.20.1
                                unknownMexico
                                8151UninetSAdeCVMXfalse
                                191.66.41.2
                                unknownColombia
                                26611COMCELSACOfalse
                                191.66.41.1
                                unknownColombia
                                26611COMCELSACOfalse
                                IP
                                192.168.2.148
                                192.168.2.149
                                192.168.2.146
                                192.168.2.147
                                192.168.2.140
                                192.168.2.141
                                192.168.2.144
                                192.168.2.145
                                192.168.2.142
                                192.168.2.143
                                192.168.2.159
                                192.168.2.157
                                192.168.2.158
                                192.168.2.151
                                192.168.2.152
                                192.168.2.150
                                192.168.2.155
                                192.168.2.156
                                192.168.2.153
                                192.168.2.154
                                192.168.2.126
                                192.168.2.247
                                192.168.2.127
                                192.168.2.248
                                192.168.2.124
                                192.168.2.245
                                192.168.2.125
                                192.168.2.246
                                192.168.2.128
                                192.168.2.249
                                192.168.2.129
                                192.168.2.240
                                192.168.2.122
                                192.168.2.243
                                192.168.2.123
                                192.168.2.244
                                192.168.2.120
                                192.168.2.241
                                192.168.2.121
                                192.168.2.242
                                192.168.2.97
                                192.168.2.137
                                192.168.2.96
                                192.168.2.138
                                192.168.2.99
                                192.168.2.135
                                192.168.2.98
                                192.168.2.136
                                192.168.2.139
                                192.168.2.250
                                192.168.2.130
                                192.168.2.251
                                192.168.2.91
                                192.168.2.90
                                192.168.2.93
                                192.168.2.133
                                192.168.2.254
                                192.168.2.92
                                192.168.2.134
                                192.168.2.95
                                192.168.2.131
                                192.168.2.252
                                192.168.2.94
                                192.168.2.132
                                192.168.2.253
                                192.168.2.104
                                192.168.2.225
                                192.168.2.105
                                192.168.2.226
                                192.168.2.102
                                192.168.2.223
                                192.168.2.103
                                192.168.2.224
                                192.168.2.108
                                192.168.2.229
                                192.168.2.109
                                192.168.2.106
                                192.168.2.227
                                192.168.2.107
                                192.168.2.228
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1591285
                                Start date and time:2025-01-14 21:14:43 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 38s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:17
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:87c6RORO31.dll
                                renamed because original name is a hash value
                                Original Sample Name:7d4c4401e1fe00bc5f751ddfabcf0e8d.dll
                                Detection:MAL
                                Classification:mal100.rans.expl.evad.winDLL@20/3@1/100
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:Failed
                                Cookbook Comments:
                                • Found application associated with file extension: .dll
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                • Excluded IPs from analysis (whitelisted): 2.17.190.73, 199.232.214.172, 13.107.246.45, 172.202.163.200
                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target tasksche.exe, PID 2304 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                15:15:39API Interceptor1x Sleep call for process: loaddll32.exe modified
                                15:16:13API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comYx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                • 104.16.166.228
                                9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                • 104.16.166.228
                                k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                • 104.16.166.228
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                • 104.16.166.228
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                                • 104.16.167.228
                                LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                                • 104.16.167.228
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                INTERDOTNET-LIG-ASDEloligang.arm.elfGet hashmaliciousMiraiBrowse
                                • 213.73.104.61
                                la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                • 84.23.233.22
                                m68k.elfGet hashmaliciousUnknownBrowse
                                • 213.73.95.219
                                cbIcBAgY5W.exeGet hashmaliciousSystemBCBrowse
                                • 84.23.254.58
                                uJG24w967i.elfGet hashmaliciousMiraiBrowse
                                • 213.73.95.201
                                huhu.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                • 84.23.228.190
                                skyljne.arm-20240109-1651.elfGet hashmaliciousMiraiBrowse
                                • 84.23.228.178
                                CekUIgRRBh.elfGet hashmaliciousMiraiBrowse
                                • 84.23.228.190
                                WE26Af2mNU.elfGet hashmaliciousMiraiBrowse
                                • 84.23.228.162
                                skid.arm.elfGet hashmaliciousMiraiBrowse
                                • 213.73.95.207
                                AMAZON-AESUShttps://savory-sweet-felidae-psrnd.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                • 34.233.109.53
                                https://click.e.varietyvibes.buzz/Y3hpZjhhck5JNVlmRWJOUitMVlFVUzdWZlpZQm41V0lZS3E5dlJjWHNLbzhudFR6Qm5uVlZMZ2hqdkVBTmpZZUxFL2tJclNpYnJaTEdFOC9RVU5CZVlkY004d3ZTblF4S0Y5NW82WmdjMFU9Get hashmaliciousUnknownBrowse
                                • 44.219.182.139
                                http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                • 34.203.167.12
                                https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                • 54.88.142.103
                                phish_alert_iocp_v1.4.58.emlGet hashmaliciousUnknownBrowse
                                • 50.16.174.40
                                email.emlGet hashmaliciousunknownBrowse
                                • 52.22.41.97
                                meth8.elfGet hashmaliciousMiraiBrowse
                                • 100.25.118.219
                                http://wagestream.acemlnb.comGet hashmaliciousUnknownBrowse
                                • 54.235.205.181
                                Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                • 34.193.195.38
                                https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                • 34.205.242.146
                                LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingmeth10.elfGet hashmaliciousMiraiBrowse
                                • 86.49.196.178
                                meth3.elfGet hashmaliciousMiraiBrowse
                                • 94.114.47.138
                                meth8.elfGet hashmaliciousMiraiBrowse
                                • 92.108.141.110
                                ppc.elfGet hashmaliciousUnknownBrowse
                                • 37.201.238.137
                                x86_64.elfGet hashmaliciousUnknownBrowse
                                • 145.252.61.107
                                meth9.elfGet hashmaliciousMiraiBrowse
                                • 84.113.57.34
                                mips.elfGet hashmaliciousUnknownBrowse
                                • 78.96.101.196
                                meth15.elfGet hashmaliciousMiraiBrowse
                                • 89.65.219.202
                                sh4.elfGet hashmaliciousUnknownBrowse
                                • 88.153.130.87
                                elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                • 77.58.215.78
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                1138de370e523e824bbca92d049a3777eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                • 173.222.162.64
                                m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                • 173.222.162.64
                                sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                • 173.222.162.64
                                MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                • 173.222.162.64
                                mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                • 173.222.162.64
                                http://titanys.mindsetmatters.buzzGet hashmaliciousScreenConnect ToolBrowse
                                • 173.222.162.64
                                Document_31055.pdfGet hashmaliciousUnknownBrowse
                                • 173.222.162.64
                                Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                • 173.222.162.64
                                https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                • 173.222.162.64
                                Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                • 173.222.162.64
                                3b5074b1b5d032e5620f69f9f700ff0em9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                • 40.113.110.67
                                MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                • 40.113.110.67
                                mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                • 40.113.110.67
                                http://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
                                • 40.113.110.67
                                lumma_phothockey.exeGet hashmaliciousLummaCBrowse
                                • 40.113.110.67
                                QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 40.113.110.67
                                EspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                • 40.113.110.67
                                SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                • 40.113.110.67
                                PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                • 40.113.110.67
                                AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                • 40.113.110.67
                                No context
                                Process:C:\Windows\mssecsvc.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3514368
                                Entropy (8bit):5.702778063005
                                Encrypted:false
                                SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHEx:QqPoBhz1aRxcSUDk36SAEdhkx
                                MD5:087BE2D4C652DD35156789E4044A5815
                                SHA1:BB9E590891E467A28A511E491E082F88C9BCA1EF
                                SHA-256:F38AC7E13323086989E78780C6785C664DE6392DB19779E96EF30BDB769D4AC6
                                SHA-512:9D1A431CFE3367C4691B13CE8680F527BB071FF773C5DA96A93F09A177D5DFC5E7D5DF7100AFD45E1A2174B3C99262BA01E80A4D3A98A8BEB1025BF67E0A27BB
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 100%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\rundll32.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3723264
                                Entropy (8bit):5.755741851302747
                                Encrypted:false
                                SSDEEP:49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHEI:yDqPoBhz1aRxcSUDk36SAEdhkI
                                MD5:47FE23C22356C88404A7B0B9A508EFFB
                                SHA1:B210745A7391B7D1B9169E1594239BBECDC76BA2
                                SHA-256:1F1FC0CF6F281DC3EC78C86FB3E42986F5A769AF28E2C27512BB557680F507FF
                                SHA-512:739010E012801E67355F54DC2E80EDCBF9A2722D40203D9E2B72A1DF8F2E05306056EDEC8471F9A655F9E768A55C44FA5618A9591CCA74BF9599B46CF97F81CF
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 100%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\mssecsvc.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3514368
                                Entropy (8bit):5.702778063005
                                Encrypted:false
                                SSDEEP:49152:nQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHEx:QqPoBhz1aRxcSUDk36SAEdhkx
                                MD5:087BE2D4C652DD35156789E4044A5815
                                SHA1:BB9E590891E467A28A511E491E082F88C9BCA1EF
                                SHA-256:F38AC7E13323086989E78780C6785C664DE6392DB19779E96EF30BDB769D4AC6
                                SHA-512:9D1A431CFE3367C4691B13CE8680F527BB071FF773C5DA96A93F09A177D5DFC5E7D5DF7100AFD45E1A2174B3C99262BA01E80A4D3A98A8BEB1025BF67E0A27BB
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 100%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):4.367309460727519
                                TrID:
                                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                • Generic Win/DOS Executable (2004/3) 0.20%
                                • DOS Executable Generic (2002/1) 0.20%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:87c6RORO31.dll
                                File size:5'267'459 bytes
                                MD5:7d4c4401e1fe00bc5f751ddfabcf0e8d
                                SHA1:f605c351811668526456a1832bad7973605e2af1
                                SHA256:d388424c0a34f9d700cbafb96839f09a945d12d34b457cd64b4e82738fcf8801
                                SHA512:f4a7b9497ff6e83238a7e7e5eb0555bbe729718a78cc8a6d01459575fbee6d402f97e78a5d0ad6fec98c15f458a1499ff97082e8aafd8385f0e2f2da6b5e9095
                                SSDEEP:49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHE:+DqPoBhz1aRxcSUDk36SAEdhk
                                TLSH:4236F119E7F4C274F05A9530A1B70EBE5635FC808AE24A4F1654FD5E3D73A28DEA3A01
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                Icon Hash:7ae282899bbab082
                                Entrypoint:0x100011e9
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x10000000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                DLL Characteristics:
                                Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                Instruction
                                push ebp
                                mov ebp, esp
                                push ebx
                                mov ebx, dword ptr [ebp+08h]
                                push esi
                                mov esi, dword ptr [ebp+0Ch]
                                push edi
                                mov edi, dword ptr [ebp+10h]
                                test esi, esi
                                jne 00007F6E34B5DB7Bh
                                cmp dword ptr [10003140h], 00000000h
                                jmp 00007F6E34B5DB98h
                                cmp esi, 01h
                                je 00007F6E34B5DB77h
                                cmp esi, 02h
                                jne 00007F6E34B5DB94h
                                mov eax, dword ptr [10003150h]
                                test eax, eax
                                je 00007F6E34B5DB7Bh
                                push edi
                                push esi
                                push ebx
                                call eax
                                test eax, eax
                                je 00007F6E34B5DB7Eh
                                push edi
                                push esi
                                push ebx
                                call 00007F6E34B5DA8Ah
                                test eax, eax
                                jne 00007F6E34B5DB76h
                                xor eax, eax
                                jmp 00007F6E34B5DBC0h
                                push edi
                                push esi
                                push ebx
                                call 00007F6E34B5D93Ch
                                cmp esi, 01h
                                mov dword ptr [ebp+0Ch], eax
                                jne 00007F6E34B5DB7Eh
                                test eax, eax
                                jne 00007F6E34B5DBA9h
                                push edi
                                push eax
                                push ebx
                                call 00007F6E34B5DA66h
                                test esi, esi
                                je 00007F6E34B5DB77h
                                cmp esi, 03h
                                jne 00007F6E34B5DB98h
                                push edi
                                push esi
                                push ebx
                                call 00007F6E34B5DA55h
                                test eax, eax
                                jne 00007F6E34B5DB75h
                                and dword ptr [ebp+0Ch], eax
                                cmp dword ptr [ebp+0Ch], 00000000h
                                je 00007F6E34B5DB83h
                                mov eax, dword ptr [10003150h]
                                test eax, eax
                                je 00007F6E34B5DB7Ah
                                push edi
                                push esi
                                push ebx
                                call eax
                                mov dword ptr [ebp+0Ch], eax
                                mov eax, dword ptr [ebp+0Ch]
                                pop edi
                                pop esi
                                pop ebx
                                pop ebp
                                retn 000Ch
                                jmp dword ptr [10002028h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                Programming Language:
                                • [ C ] VS98 (6.0) build 8168
                                • [C++] VS98 (6.0) build 8168
                                • [RES] VS98 (6.0) cvtres build 1720
                                • [LNK] VS98 (6.0) imp/exp build 8168
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x40000x5000600x5010009628215d8abc23008f61847b962a0e1dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                W0x40600x500000dataEnglishUnited States0.8770942687988281
                                DLLImport
                                KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                NameOrdinalAddress
                                PlayGame10x10001114
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2025-01-14T21:15:38.804144+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.6626851.1.1.153UDP
                                2025-01-14T21:15:39.317920+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649709104.16.166.22880TCP
                                2025-01-14T21:15:39.317920+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649709104.16.166.22880TCP
                                2025-01-14T21:15:39.317920+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649709104.16.166.22880TCP
                                2025-01-14T21:15:39.317920+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649709104.16.166.22880TCP
                                2025-01-14T21:15:39.317920+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649709104.16.166.22880TCP
                                2025-01-14T21:15:39.323066+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.649709TCP
                                2025-01-14T21:15:40.422926+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649711104.16.166.22880TCP
                                2025-01-14T21:15:40.422926+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649711104.16.166.22880TCP
                                2025-01-14T21:15:40.422926+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649711104.16.166.22880TCP
                                2025-01-14T21:15:40.422926+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649711104.16.166.22880TCP
                                2025-01-14T21:15:40.422926+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649711104.16.166.22880TCP
                                2025-01-14T21:15:40.422953+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.649711TCP
                                2025-01-14T21:15:41.688897+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649728104.16.166.22880TCP
                                2025-01-14T21:15:41.688897+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.649728104.16.166.22880TCP
                                2025-01-14T21:15:41.688897+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.649728104.16.166.22880TCP
                                2025-01-14T21:15:41.688897+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.649728104.16.166.22880TCP
                                2025-01-14T21:15:41.688897+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.649728104.16.166.22880TCP
                                2025-01-14T21:15:41.689013+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.649728TCP
                                2025-01-14T21:17:46.511479+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.650642104.16.166.22880TCP
                                2025-01-14T21:17:46.511479+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.650642104.16.166.22880TCP
                                2025-01-14T21:17:46.511479+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.650642104.16.166.22880TCP
                                2025-01-14T21:17:46.511479+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.650642104.16.166.22880TCP
                                2025-01-14T21:17:46.511479+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.650642104.16.166.22880TCP
                                2025-01-14T21:17:46.516405+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.166.22880192.168.2.650642TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 14, 2025 21:15:32.252203941 CET49674443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:32.252226114 CET49673443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:32.595956087 CET49672443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:38.819052935 CET4970980192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:38.823937893 CET8049709104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:38.826139927 CET4970980192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:38.827069044 CET4970980192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:38.831837893 CET8049709104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:39.314125061 CET8049709104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:39.314553976 CET8049709104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:39.317919970 CET4970980192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:39.317919970 CET4970980192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:39.317919970 CET4970980192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:39.323065996 CET8049709104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:39.462039948 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:39.462095022 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:39.462161064 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:39.463186026 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:39.463200092 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:39.915577888 CET4971180192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:39.920769930 CET8049711104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:39.920974970 CET4971180192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:39.920974970 CET4971180192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:39.925776958 CET8049711104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:40.271433115 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.271575928 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:40.277029991 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:40.277045012 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.277359962 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.279056072 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:40.279117107 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:40.279123068 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.279253960 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:40.319339991 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.422864914 CET8049711104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:40.422925949 CET4971180192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:40.422952890 CET8049711104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:40.423080921 CET4971180192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:40.423080921 CET4971180192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:40.427956104 CET8049711104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:40.448224068 CET49712445192.168.2.6153.163.31.93
                                Jan 14, 2025 21:15:40.453728914 CET44549712153.163.31.93192.168.2.6
                                Jan 14, 2025 21:15:40.453803062 CET49712445192.168.2.6153.163.31.93
                                Jan 14, 2025 21:15:40.454462051 CET49712445192.168.2.6153.163.31.93
                                Jan 14, 2025 21:15:40.454674006 CET49713445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:15:40.459379911 CET44549712153.163.31.93192.168.2.6
                                Jan 14, 2025 21:15:40.459435940 CET49712445192.168.2.6153.163.31.93
                                Jan 14, 2025 21:15:40.460141897 CET44549713153.163.31.1192.168.2.6
                                Jan 14, 2025 21:15:40.460221052 CET49713445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:15:40.460356951 CET49713445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:15:40.461998940 CET49714445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:15:40.465251923 CET44549713153.163.31.1192.168.2.6
                                Jan 14, 2025 21:15:40.465377092 CET49713445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:15:40.466924906 CET44549714153.163.31.1192.168.2.6
                                Jan 14, 2025 21:15:40.467066050 CET49714445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:15:40.467066050 CET49714445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:15:40.467427969 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.467662096 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.467722893 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:40.467829943 CET49710443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:40.467849016 CET4434971040.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:40.472187042 CET44549714153.163.31.1192.168.2.6
                                Jan 14, 2025 21:15:41.178875923 CET4972880192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:41.183923960 CET8049728104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:41.186252117 CET4972880192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:41.186252117 CET4972880192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:41.191426992 CET8049728104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:41.688304901 CET8049728104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:41.688896894 CET4972880192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:41.688896894 CET4972880192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:41.689013004 CET8049728104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:41.690196991 CET4972880192.168.2.6104.16.166.228
                                Jan 14, 2025 21:15:41.693789959 CET8049728104.16.166.228192.168.2.6
                                Jan 14, 2025 21:15:41.861536980 CET49673443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:41.861653090 CET49674443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:42.205280066 CET49672443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:42.510351896 CET49738445192.168.2.6151.121.73.209
                                Jan 14, 2025 21:15:42.515465021 CET44549738151.121.73.209192.168.2.6
                                Jan 14, 2025 21:15:42.515551090 CET49738445192.168.2.6151.121.73.209
                                Jan 14, 2025 21:15:42.515625954 CET49738445192.168.2.6151.121.73.209
                                Jan 14, 2025 21:15:42.515850067 CET49739445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:15:42.520760059 CET44549738151.121.73.209192.168.2.6
                                Jan 14, 2025 21:15:42.520777941 CET44549739151.121.73.1192.168.2.6
                                Jan 14, 2025 21:15:42.520808935 CET49738445192.168.2.6151.121.73.209
                                Jan 14, 2025 21:15:42.520865917 CET49739445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:15:42.520917892 CET49739445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:15:42.523236990 CET49740445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:15:42.525944948 CET44549739151.121.73.1192.168.2.6
                                Jan 14, 2025 21:15:42.525999069 CET49739445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:15:42.528134108 CET44549740151.121.73.1192.168.2.6
                                Jan 14, 2025 21:15:42.528193951 CET49740445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:15:42.528285980 CET49740445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:15:42.533143044 CET44549740151.121.73.1192.168.2.6
                                Jan 14, 2025 21:15:43.906227112 CET44349705173.222.162.64192.168.2.6
                                Jan 14, 2025 21:15:43.906367064 CET49705443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:44.519042969 CET49773445192.168.2.654.89.210.39
                                Jan 14, 2025 21:15:44.524111032 CET4454977354.89.210.39192.168.2.6
                                Jan 14, 2025 21:15:44.524204969 CET49773445192.168.2.654.89.210.39
                                Jan 14, 2025 21:15:44.524259090 CET49773445192.168.2.654.89.210.39
                                Jan 14, 2025 21:15:44.524507999 CET49774445192.168.2.654.89.210.1
                                Jan 14, 2025 21:15:44.529284954 CET4454977454.89.210.1192.168.2.6
                                Jan 14, 2025 21:15:44.529351950 CET49774445192.168.2.654.89.210.1
                                Jan 14, 2025 21:15:44.529419899 CET49774445192.168.2.654.89.210.1
                                Jan 14, 2025 21:15:44.530620098 CET49775445192.168.2.654.89.210.1
                                Jan 14, 2025 21:15:44.532282114 CET4454977354.89.210.39192.168.2.6
                                Jan 14, 2025 21:15:44.532342911 CET49773445192.168.2.654.89.210.39
                                Jan 14, 2025 21:15:44.534925938 CET4454977454.89.210.1192.168.2.6
                                Jan 14, 2025 21:15:44.535008907 CET49774445192.168.2.654.89.210.1
                                Jan 14, 2025 21:15:44.535418987 CET4454977554.89.210.1192.168.2.6
                                Jan 14, 2025 21:15:44.535487890 CET49775445192.168.2.654.89.210.1
                                Jan 14, 2025 21:15:44.535540104 CET49775445192.168.2.654.89.210.1
                                Jan 14, 2025 21:15:44.540369034 CET4454977554.89.210.1192.168.2.6
                                Jan 14, 2025 21:15:46.534729004 CET49808445192.168.2.6155.86.254.113
                                Jan 14, 2025 21:15:46.539602041 CET44549808155.86.254.113192.168.2.6
                                Jan 14, 2025 21:15:46.539707899 CET49808445192.168.2.6155.86.254.113
                                Jan 14, 2025 21:15:46.539767981 CET49808445192.168.2.6155.86.254.113
                                Jan 14, 2025 21:15:46.539956093 CET49809445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:15:46.544703007 CET44549808155.86.254.113192.168.2.6
                                Jan 14, 2025 21:15:46.544756889 CET49808445192.168.2.6155.86.254.113
                                Jan 14, 2025 21:15:46.544761896 CET44549809155.86.254.1192.168.2.6
                                Jan 14, 2025 21:15:46.544810057 CET49809445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:15:46.544845104 CET49809445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:15:46.546067953 CET49810445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:15:46.549925089 CET44549809155.86.254.1192.168.2.6
                                Jan 14, 2025 21:15:46.550004959 CET49809445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:15:46.550894022 CET44549810155.86.254.1192.168.2.6
                                Jan 14, 2025 21:15:46.550965071 CET49810445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:15:46.551008940 CET49810445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:15:46.555766106 CET44549810155.86.254.1192.168.2.6
                                Jan 14, 2025 21:15:47.431770086 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:47.431874990 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:47.431962967 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:47.432549000 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:47.432583094 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.263612986 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.263685942 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:48.265780926 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:48.265795946 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.266638994 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.269833088 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:48.270019054 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:48.270025969 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.270423889 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:48.315334082 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.464823961 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.465009928 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.465130091 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:48.465229034 CET49825443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:48.465249062 CET4434982540.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:48.550445080 CET49846445192.168.2.644.206.62.213
                                Jan 14, 2025 21:15:48.555273056 CET4454984644.206.62.213192.168.2.6
                                Jan 14, 2025 21:15:48.555349112 CET49846445192.168.2.644.206.62.213
                                Jan 14, 2025 21:15:48.555387974 CET49846445192.168.2.644.206.62.213
                                Jan 14, 2025 21:15:48.555561066 CET49847445192.168.2.644.206.62.1
                                Jan 14, 2025 21:15:48.560317039 CET4454984644.206.62.213192.168.2.6
                                Jan 14, 2025 21:15:48.560414076 CET4454984744.206.62.1192.168.2.6
                                Jan 14, 2025 21:15:48.560424089 CET4454984644.206.62.213192.168.2.6
                                Jan 14, 2025 21:15:48.560482025 CET49846445192.168.2.644.206.62.213
                                Jan 14, 2025 21:15:48.560549974 CET49847445192.168.2.644.206.62.1
                                Jan 14, 2025 21:15:48.560549974 CET49847445192.168.2.644.206.62.1
                                Jan 14, 2025 21:15:48.561388016 CET49848445192.168.2.644.206.62.1
                                Jan 14, 2025 21:15:48.565654039 CET4454984744.206.62.1192.168.2.6
                                Jan 14, 2025 21:15:48.565735102 CET49847445192.168.2.644.206.62.1
                                Jan 14, 2025 21:15:48.566241980 CET4454984844.206.62.1192.168.2.6
                                Jan 14, 2025 21:15:48.566313982 CET49848445192.168.2.644.206.62.1
                                Jan 14, 2025 21:15:48.566358089 CET49848445192.168.2.644.206.62.1
                                Jan 14, 2025 21:15:48.571625948 CET4454984844.206.62.1192.168.2.6
                                Jan 14, 2025 21:15:50.566243887 CET49880445192.168.2.6191.66.41.185
                                Jan 14, 2025 21:15:50.571207047 CET44549880191.66.41.185192.168.2.6
                                Jan 14, 2025 21:15:50.571329117 CET49880445192.168.2.6191.66.41.185
                                Jan 14, 2025 21:15:50.571358919 CET49880445192.168.2.6191.66.41.185
                                Jan 14, 2025 21:15:50.571482897 CET49881445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:15:50.576405048 CET44549881191.66.41.1192.168.2.6
                                Jan 14, 2025 21:15:50.576493979 CET44549880191.66.41.185192.168.2.6
                                Jan 14, 2025 21:15:50.576582909 CET49881445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:15:50.576911926 CET44549880191.66.41.185192.168.2.6
                                Jan 14, 2025 21:15:50.576950073 CET49881445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:15:50.576981068 CET49880445192.168.2.6191.66.41.185
                                Jan 14, 2025 21:15:50.577673912 CET49882445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:15:50.581980944 CET44549881191.66.41.1192.168.2.6
                                Jan 14, 2025 21:15:50.582048893 CET49881445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:15:50.582520008 CET44549882191.66.41.1192.168.2.6
                                Jan 14, 2025 21:15:50.582601070 CET49882445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:15:50.582669973 CET49882445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:15:50.587440968 CET44549882191.66.41.1192.168.2.6
                                Jan 14, 2025 21:15:52.582632065 CET49917445192.168.2.677.250.55.206
                                Jan 14, 2025 21:15:52.587431908 CET4454991777.250.55.206192.168.2.6
                                Jan 14, 2025 21:15:52.587527037 CET49917445192.168.2.677.250.55.206
                                Jan 14, 2025 21:15:52.587538958 CET49917445192.168.2.677.250.55.206
                                Jan 14, 2025 21:15:52.587743998 CET49918445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:52.592535973 CET4454991777.250.55.206192.168.2.6
                                Jan 14, 2025 21:15:52.592582941 CET4454991877.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:52.592597961 CET49917445192.168.2.677.250.55.206
                                Jan 14, 2025 21:15:52.592653036 CET49918445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:52.592725039 CET49918445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:52.593020916 CET49919445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:52.597654104 CET4454991877.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:52.597728014 CET49918445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:52.597867012 CET4454991977.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:52.597959995 CET49919445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:52.598031998 CET49919445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:52.602782011 CET4454991977.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:53.885519028 CET49705443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:53.885588884 CET49705443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:53.885896921 CET49946443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:53.885997057 CET44349946173.222.162.64192.168.2.6
                                Jan 14, 2025 21:15:53.886094093 CET49946443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:53.886291027 CET49946443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:53.886329889 CET44349946173.222.162.64192.168.2.6
                                Jan 14, 2025 21:15:53.890392065 CET44349705173.222.162.64192.168.2.6
                                Jan 14, 2025 21:15:53.890547991 CET44349705173.222.162.64192.168.2.6
                                Jan 14, 2025 21:15:54.231389046 CET4454991977.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:54.231476068 CET49919445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:54.231575012 CET49919445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:54.231575012 CET49919445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:54.236409903 CET4454991977.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:54.236423969 CET4454991977.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:54.484004974 CET44349946173.222.162.64192.168.2.6
                                Jan 14, 2025 21:15:54.484122992 CET49946443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:15:54.596892118 CET49959445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.601716995 CET445499594.233.82.1192.168.2.6
                                Jan 14, 2025 21:15:54.601994991 CET49960445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.602006912 CET49959445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.602006912 CET49959445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.606812000 CET445499604.233.82.1192.168.2.6
                                Jan 14, 2025 21:15:54.606877089 CET49960445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.607234001 CET49961445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.607336044 CET49960445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.607479095 CET445499594.233.82.1192.168.2.6
                                Jan 14, 2025 21:15:54.607803106 CET49959445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.612189054 CET445499614.233.82.1192.168.2.6
                                Jan 14, 2025 21:15:54.612202883 CET445499604.233.82.1192.168.2.6
                                Jan 14, 2025 21:15:54.612286091 CET49960445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.612307072 CET49961445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.612307072 CET49961445192.168.2.64.233.82.1
                                Jan 14, 2025 21:15:54.617144108 CET445499614.233.82.1192.168.2.6
                                Jan 14, 2025 21:15:56.612407923 CET49990445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:15:56.780905962 CET44549990157.44.49.2192.168.2.6
                                Jan 14, 2025 21:15:56.780966997 CET49990445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:15:56.781061888 CET49990445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:15:56.781248093 CET49993445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:15:56.786525011 CET44549993157.44.49.1192.168.2.6
                                Jan 14, 2025 21:15:56.786622047 CET49993445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:15:56.786961079 CET49993445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:15:56.786982059 CET49994445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:15:56.788912058 CET44549990157.44.49.2192.168.2.6
                                Jan 14, 2025 21:15:56.789294004 CET44549990157.44.49.2192.168.2.6
                                Jan 14, 2025 21:15:56.789402962 CET49990445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:15:56.791750908 CET44549994157.44.49.1192.168.2.6
                                Jan 14, 2025 21:15:56.791816950 CET49994445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:15:56.791843891 CET49994445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:15:56.792308092 CET44549993157.44.49.1192.168.2.6
                                Jan 14, 2025 21:15:56.793091059 CET44549993157.44.49.1192.168.2.6
                                Jan 14, 2025 21:15:56.793211937 CET49993445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:15:56.796629906 CET44549994157.44.49.1192.168.2.6
                                Jan 14, 2025 21:15:57.237195969 CET50006445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:57.242110968 CET4455000677.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:57.244530916 CET50006445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:57.247673988 CET50006445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:57.252558947 CET4455000677.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:58.627763987 CET50030445192.168.2.684.23.243.24
                                Jan 14, 2025 21:15:58.632669926 CET4455003084.23.243.24192.168.2.6
                                Jan 14, 2025 21:15:58.632756948 CET50030445192.168.2.684.23.243.24
                                Jan 14, 2025 21:15:58.632805109 CET50030445192.168.2.684.23.243.24
                                Jan 14, 2025 21:15:58.633033991 CET50031445192.168.2.684.23.243.1
                                Jan 14, 2025 21:15:58.637931108 CET4455003084.23.243.24192.168.2.6
                                Jan 14, 2025 21:15:58.637948990 CET4455003184.23.243.1192.168.2.6
                                Jan 14, 2025 21:15:58.638000011 CET50030445192.168.2.684.23.243.24
                                Jan 14, 2025 21:15:58.638070107 CET50031445192.168.2.684.23.243.1
                                Jan 14, 2025 21:15:58.638210058 CET50031445192.168.2.684.23.243.1
                                Jan 14, 2025 21:15:58.638529062 CET50032445192.168.2.684.23.243.1
                                Jan 14, 2025 21:15:58.643122911 CET4455003184.23.243.1192.168.2.6
                                Jan 14, 2025 21:15:58.643229008 CET50031445192.168.2.684.23.243.1
                                Jan 14, 2025 21:15:58.643363953 CET4455003284.23.243.1192.168.2.6
                                Jan 14, 2025 21:15:58.643467903 CET50032445192.168.2.684.23.243.1
                                Jan 14, 2025 21:15:58.643467903 CET50032445192.168.2.684.23.243.1
                                Jan 14, 2025 21:15:58.648283958 CET4455003284.23.243.1192.168.2.6
                                Jan 14, 2025 21:15:58.887834072 CET4455000677.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:58.887919903 CET50006445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:58.888025999 CET50006445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:58.888025999 CET50006445192.168.2.677.250.55.1
                                Jan 14, 2025 21:15:58.892941952 CET4455000677.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:58.892973900 CET4455000677.250.55.1192.168.2.6
                                Jan 14, 2025 21:15:58.945132971 CET50036445192.168.2.677.250.55.2
                                Jan 14, 2025 21:15:58.950145006 CET4455003677.250.55.2192.168.2.6
                                Jan 14, 2025 21:15:58.950267076 CET50036445192.168.2.677.250.55.2
                                Jan 14, 2025 21:15:58.950351000 CET50036445192.168.2.677.250.55.2
                                Jan 14, 2025 21:15:58.953043938 CET50038445192.168.2.677.250.55.2
                                Jan 14, 2025 21:15:58.955523014 CET4455003677.250.55.2192.168.2.6
                                Jan 14, 2025 21:15:58.955604076 CET50036445192.168.2.677.250.55.2
                                Jan 14, 2025 21:15:58.957866907 CET4455003877.250.55.2192.168.2.6
                                Jan 14, 2025 21:15:58.957993984 CET50038445192.168.2.677.250.55.2
                                Jan 14, 2025 21:15:58.958048105 CET50038445192.168.2.677.250.55.2
                                Jan 14, 2025 21:15:58.962971926 CET4455003877.250.55.2192.168.2.6
                                Jan 14, 2025 21:15:59.902725935 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:59.902776003 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:15:59.902913094 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:59.903779030 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:15:59.903793097 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.643269062 CET50068445192.168.2.6134.155.108.54
                                Jan 14, 2025 21:16:00.648181915 CET44550068134.155.108.54192.168.2.6
                                Jan 14, 2025 21:16:00.648269892 CET50068445192.168.2.6134.155.108.54
                                Jan 14, 2025 21:16:00.648339033 CET50068445192.168.2.6134.155.108.54
                                Jan 14, 2025 21:16:00.648525000 CET50069445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:00.653285980 CET44550069134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:00.653361082 CET50069445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:00.653382063 CET50069445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:00.653510094 CET44550068134.155.108.54192.168.2.6
                                Jan 14, 2025 21:16:00.653636932 CET50068445192.168.2.6134.155.108.54
                                Jan 14, 2025 21:16:00.653755903 CET50070445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:00.658395052 CET44550069134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:00.658535004 CET44550070134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:00.658588886 CET50069445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:00.658617020 CET50070445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:00.658657074 CET50070445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:00.663467884 CET44550070134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:00.699773073 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.699862003 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:00.704832077 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:00.704859972 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.705677032 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.707598925 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:00.707664967 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:00.707679033 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.707828999 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:00.751342058 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.881125927 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.881901979 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.881962061 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:00.882241964 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:00.882258892 CET4435005440.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:00.882275105 CET50054443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:01.880104065 CET44549714153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:01.880160093 CET49714445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:01.880311012 CET49714445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:01.880342960 CET49714445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:01.885143995 CET44549714153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:01.885157108 CET44549714153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:02.659100056 CET50106445192.168.2.665.97.172.49
                                Jan 14, 2025 21:16:02.664175987 CET4455010665.97.172.49192.168.2.6
                                Jan 14, 2025 21:16:02.664416075 CET50106445192.168.2.665.97.172.49
                                Jan 14, 2025 21:16:02.664526939 CET50106445192.168.2.665.97.172.49
                                Jan 14, 2025 21:16:02.664838076 CET50107445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:02.669708967 CET4455010765.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:02.669826984 CET50107445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:02.669826984 CET50107445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:02.670244932 CET50108445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:02.672343016 CET4455010665.97.172.49192.168.2.6
                                Jan 14, 2025 21:16:02.674274921 CET4455010665.97.172.49192.168.2.6
                                Jan 14, 2025 21:16:02.675178051 CET4455010865.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:02.675246954 CET50106445192.168.2.665.97.172.49
                                Jan 14, 2025 21:16:02.675296068 CET50108445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:02.675343037 CET50108445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:02.676399946 CET4455010765.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:02.680270910 CET4455010865.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:02.682365894 CET4455010765.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:02.682430029 CET50107445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:03.925519943 CET44549740151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:03.926290035 CET49740445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:03.926290035 CET49740445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:03.930080891 CET49740445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:03.931071997 CET44549740151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:03.934861898 CET44549740151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:04.674547911 CET50141445192.168.2.6120.51.196.176
                                Jan 14, 2025 21:16:04.679455042 CET44550141120.51.196.176192.168.2.6
                                Jan 14, 2025 21:16:04.679584980 CET50141445192.168.2.6120.51.196.176
                                Jan 14, 2025 21:16:04.679634094 CET50141445192.168.2.6120.51.196.176
                                Jan 14, 2025 21:16:04.679718018 CET50142445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:04.684514046 CET44550142120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:04.684648037 CET50142445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:04.684648037 CET50142445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:04.684673071 CET44550141120.51.196.176192.168.2.6
                                Jan 14, 2025 21:16:04.685018063 CET50143445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:04.685034037 CET50141445192.168.2.6120.51.196.176
                                Jan 14, 2025 21:16:04.689558983 CET44550142120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:04.689636946 CET50142445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:04.689802885 CET44550143120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:04.689878941 CET50143445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:04.689901114 CET50143445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:04.694684982 CET44550143120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:04.893023014 CET50147445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:04.897864103 CET44550147153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:04.897983074 CET50147445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:04.898009062 CET50147445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:04.902782917 CET44550147153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:05.909498930 CET4454977554.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:05.909579039 CET49775445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:05.909663916 CET49775445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:05.909739017 CET49775445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:05.914554119 CET4454977554.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:05.914563894 CET4454977554.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:06.690141916 CET50158445192.168.2.662.31.110.70
                                Jan 14, 2025 21:16:06.695615053 CET4455015862.31.110.70192.168.2.6
                                Jan 14, 2025 21:16:06.695700884 CET50158445192.168.2.662.31.110.70
                                Jan 14, 2025 21:16:06.695761919 CET50158445192.168.2.662.31.110.70
                                Jan 14, 2025 21:16:06.695854902 CET50159445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:06.701162100 CET4455015962.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:06.701174021 CET4455015862.31.110.70192.168.2.6
                                Jan 14, 2025 21:16:06.701283932 CET50158445192.168.2.662.31.110.70
                                Jan 14, 2025 21:16:06.701287985 CET50159445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:06.701396942 CET50159445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:06.701778889 CET50160445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:06.706280947 CET4455015962.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:06.706363916 CET50159445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:06.706547976 CET4455016062.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:06.706603050 CET50160445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:06.706624985 CET50160445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:06.714040041 CET4455016062.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:06.940188885 CET50163445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:06.945003986 CET44550163151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:06.945075035 CET50163445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:06.945111990 CET50163445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:06.949843884 CET44550163151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:07.927412987 CET44549810155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:07.927475929 CET49810445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:07.927527905 CET49810445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:07.927598000 CET49810445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:07.932306051 CET44549810155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:07.932359934 CET44549810155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:08.705774069 CET50175445192.168.2.686.201.63.14
                                Jan 14, 2025 21:16:08.710638046 CET4455017586.201.63.14192.168.2.6
                                Jan 14, 2025 21:16:08.710839033 CET50175445192.168.2.686.201.63.14
                                Jan 14, 2025 21:16:08.710839033 CET50175445192.168.2.686.201.63.14
                                Jan 14, 2025 21:16:08.710987091 CET50176445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:08.715759993 CET4455017686.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:08.715862036 CET50176445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:08.715862036 CET50176445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:08.715918064 CET4455017586.201.63.14192.168.2.6
                                Jan 14, 2025 21:16:08.715966940 CET50175445192.168.2.686.201.63.14
                                Jan 14, 2025 21:16:08.716243982 CET50178445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:08.721009016 CET4455017886.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:08.721086979 CET50178445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:08.721112013 CET50178445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:08.721118927 CET4455017686.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:08.721173048 CET50176445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:08.725954056 CET4455017886.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:08.924485922 CET50180445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:08.929366112 CET4455018054.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:08.929500103 CET50180445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:08.929661036 CET50180445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:08.934436083 CET4455018054.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:09.922887087 CET4454984844.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:09.926175117 CET49848445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:09.926218033 CET49848445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:09.926270008 CET49848445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:09.931097031 CET4454984844.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:09.931126118 CET4454984844.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:10.774450064 CET50191445192.168.2.652.95.229.127
                                Jan 14, 2025 21:16:10.779351950 CET4455019152.95.229.127192.168.2.6
                                Jan 14, 2025 21:16:10.779424906 CET50191445192.168.2.652.95.229.127
                                Jan 14, 2025 21:16:10.779769897 CET50191445192.168.2.652.95.229.127
                                Jan 14, 2025 21:16:10.779957056 CET50192445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:10.784693956 CET4455019152.95.229.127192.168.2.6
                                Jan 14, 2025 21:16:10.784755945 CET50191445192.168.2.652.95.229.127
                                Jan 14, 2025 21:16:10.784812927 CET4455019252.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:10.784873009 CET50192445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:10.786029100 CET50192445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:10.790915012 CET4455019252.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:10.790987968 CET50192445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:10.940041065 CET50194445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:10.944931030 CET44550194155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:10.945029020 CET50194445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:10.945171118 CET50194445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:10.949976921 CET44550194155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:10.957482100 CET50195445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:10.962395906 CET4455019552.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:10.962456942 CET50195445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:10.962661982 CET50195445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:10.967449903 CET4455019552.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:11.958580017 CET44549882191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:11.958836079 CET49882445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:11.958901882 CET49882445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:11.958982944 CET49882445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:11.963862896 CET44549882191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:11.963896990 CET44549882191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:12.784264088 CET50209445192.168.2.680.105.222.65
                                Jan 14, 2025 21:16:12.789212942 CET4455020980.105.222.65192.168.2.6
                                Jan 14, 2025 21:16:12.789655924 CET50209445192.168.2.680.105.222.65
                                Jan 14, 2025 21:16:12.789705038 CET50209445192.168.2.680.105.222.65
                                Jan 14, 2025 21:16:12.789834976 CET50210445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:12.794631004 CET4455021080.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:12.794720888 CET4455020980.105.222.65192.168.2.6
                                Jan 14, 2025 21:16:12.794855118 CET50210445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:12.794858932 CET50209445192.168.2.680.105.222.65
                                Jan 14, 2025 21:16:12.795336962 CET50211445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:12.799892902 CET4455021080.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:12.799969912 CET50210445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:12.800154924 CET4455021180.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:12.803339958 CET50211445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:12.803339958 CET50211445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:12.808208942 CET4455021180.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:12.940052032 CET50212445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:12.944952011 CET4455021244.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:12.945055962 CET50212445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:12.945101023 CET50212445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:12.949856043 CET4455021244.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:13.760065079 CET44349946173.222.162.64192.168.2.6
                                Jan 14, 2025 21:16:13.760204077 CET49946443192.168.2.6173.222.162.64
                                Jan 14, 2025 21:16:14.799916983 CET50225445192.168.2.649.6.27.70
                                Jan 14, 2025 21:16:14.804847956 CET4455022549.6.27.70192.168.2.6
                                Jan 14, 2025 21:16:14.804969072 CET50225445192.168.2.649.6.27.70
                                Jan 14, 2025 21:16:14.805067062 CET50225445192.168.2.649.6.27.70
                                Jan 14, 2025 21:16:14.805250883 CET50226445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:14.810198069 CET4455022649.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:14.810292959 CET4455022549.6.27.70192.168.2.6
                                Jan 14, 2025 21:16:14.810302019 CET50226445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:14.810353041 CET50225445192.168.2.649.6.27.70
                                Jan 14, 2025 21:16:14.810434103 CET50226445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:14.810781002 CET50227445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:14.815619946 CET4455022649.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:14.815695047 CET50226445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:14.815710068 CET4455022749.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:14.815784931 CET50227445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:14.815824032 CET50227445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:14.820694923 CET4455022749.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:14.971391916 CET50230445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:14.976545095 CET44550230191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:14.976654053 CET50230445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:14.976706028 CET50230445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:14.981502056 CET44550230191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:15.989999056 CET445499614.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:15.990171909 CET49961445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:15.990273952 CET49961445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:15.990273952 CET49961445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:15.995178938 CET445499614.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:15.995189905 CET445499614.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:16.675204039 CET50242445192.168.2.651.152.12.8
                                Jan 14, 2025 21:16:16.680085897 CET4455024251.152.12.8192.168.2.6
                                Jan 14, 2025 21:16:16.680181980 CET50242445192.168.2.651.152.12.8
                                Jan 14, 2025 21:16:16.680222988 CET50242445192.168.2.651.152.12.8
                                Jan 14, 2025 21:16:16.680525064 CET50243445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:16.685152054 CET4455024251.152.12.8192.168.2.6
                                Jan 14, 2025 21:16:16.685229063 CET50242445192.168.2.651.152.12.8
                                Jan 14, 2025 21:16:16.685353994 CET4455024351.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:16.685426950 CET50243445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:16.685472012 CET50243445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:16.685730934 CET50244445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:16.690431118 CET4455024351.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:16.690505028 CET50243445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:16.690581083 CET4455024451.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:16.690638065 CET50244445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:16.690677881 CET50244445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:16.695518970 CET4455024451.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:18.157876968 CET44549994157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:18.158097029 CET49994445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:18.158097029 CET49994445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:18.158097029 CET49994445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:18.163036108 CET44549994157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:18.163045883 CET44549994157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:18.425036907 CET50256445192.168.2.6200.186.41.185
                                Jan 14, 2025 21:16:18.429992914 CET44550256200.186.41.185192.168.2.6
                                Jan 14, 2025 21:16:18.430104017 CET50256445192.168.2.6200.186.41.185
                                Jan 14, 2025 21:16:18.430186987 CET50256445192.168.2.6200.186.41.185
                                Jan 14, 2025 21:16:18.430363894 CET50257445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:18.435271025 CET44550257200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:18.435338020 CET50257445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:18.435372114 CET50257445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:18.435695887 CET50258445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:18.436368942 CET44550256200.186.41.185192.168.2.6
                                Jan 14, 2025 21:16:18.438275099 CET44550256200.186.41.185192.168.2.6
                                Jan 14, 2025 21:16:18.438416958 CET50256445192.168.2.6200.186.41.185
                                Jan 14, 2025 21:16:18.440432072 CET44550257200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:18.440460920 CET44550257200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:18.440531969 CET50257445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:18.440594912 CET44550258200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:18.440690041 CET50258445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:18.440732002 CET50258445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:18.445595980 CET44550258200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:19.004614115 CET50263445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:19.009578943 CET445502634.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:19.012934923 CET50263445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:19.012999058 CET50263445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:19.017774105 CET445502634.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:19.213227987 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:19.213280916 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:19.213395119 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:19.214066029 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:19.214081049 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.002419949 CET4455003284.23.243.1192.168.2.6
                                Jan 14, 2025 21:16:20.002477884 CET50032445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:20.002809048 CET50032445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:20.002912998 CET50032445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:20.007589102 CET4455003284.23.243.1192.168.2.6
                                Jan 14, 2025 21:16:20.007632971 CET4455003284.23.243.1192.168.2.6
                                Jan 14, 2025 21:16:20.065432072 CET50271445192.168.2.652.131.121.14
                                Jan 14, 2025 21:16:20.070337057 CET4455027152.131.121.14192.168.2.6
                                Jan 14, 2025 21:16:20.070415974 CET50271445192.168.2.652.131.121.14
                                Jan 14, 2025 21:16:20.070444107 CET50271445192.168.2.652.131.121.14
                                Jan 14, 2025 21:16:20.070588112 CET50272445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:20.075402021 CET4455027252.131.121.1192.168.2.6
                                Jan 14, 2025 21:16:20.075469017 CET50272445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:20.075547934 CET50272445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:20.075922966 CET50273445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:20.078244925 CET4455027152.131.121.14192.168.2.6
                                Jan 14, 2025 21:16:20.078289986 CET50271445192.168.2.652.131.121.14
                                Jan 14, 2025 21:16:20.080486059 CET4455027252.131.121.1192.168.2.6
                                Jan 14, 2025 21:16:20.080528021 CET50272445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:20.080773115 CET4455027352.131.121.1192.168.2.6
                                Jan 14, 2025 21:16:20.080838919 CET50273445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:20.080864906 CET50273445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:20.085617065 CET4455027352.131.121.1192.168.2.6
                                Jan 14, 2025 21:16:20.105988979 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.106086969 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.108586073 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.108608007 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.108927965 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.111104012 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.111159086 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.111167908 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.111368895 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.155334949 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.308949947 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.309609890 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.309667110 CET4435026540.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:20.309689045 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.309720039 CET50265443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:20.314121008 CET4455003877.250.55.2192.168.2.6
                                Jan 14, 2025 21:16:20.314235926 CET50038445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:20.314235926 CET50038445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:20.314308882 CET50038445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:20.319225073 CET4455003877.250.55.2192.168.2.6
                                Jan 14, 2025 21:16:20.319236040 CET4455003877.250.55.2192.168.2.6
                                Jan 14, 2025 21:16:21.158900976 CET50280445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:21.163760900 CET44550280157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:21.166177034 CET50280445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:21.166177988 CET50280445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:21.171029091 CET44550280157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:21.596977949 CET50285445192.168.2.6186.79.150.182
                                Jan 14, 2025 21:16:21.601846933 CET44550285186.79.150.182192.168.2.6
                                Jan 14, 2025 21:16:21.601934910 CET50285445192.168.2.6186.79.150.182
                                Jan 14, 2025 21:16:21.601975918 CET50285445192.168.2.6186.79.150.182
                                Jan 14, 2025 21:16:21.602118969 CET50286445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:21.606929064 CET44550286186.79.150.1192.168.2.6
                                Jan 14, 2025 21:16:21.606997967 CET50286445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:21.607088089 CET50286445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:21.607440948 CET50287445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:21.607995987 CET44550285186.79.150.182192.168.2.6
                                Jan 14, 2025 21:16:21.608063936 CET50285445192.168.2.6186.79.150.182
                                Jan 14, 2025 21:16:21.611893892 CET44550286186.79.150.1192.168.2.6
                                Jan 14, 2025 21:16:21.611937046 CET50286445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:21.612202883 CET44550287186.79.150.1192.168.2.6
                                Jan 14, 2025 21:16:21.612260103 CET50287445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:21.612296104 CET50287445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:21.617075920 CET44550287186.79.150.1192.168.2.6
                                Jan 14, 2025 21:16:22.023184061 CET44550070134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:22.024483919 CET50070445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:22.024483919 CET50070445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:22.024573088 CET50070445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:22.029285908 CET44550070134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:22.029371977 CET44550070134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:23.018697023 CET50298445192.168.2.6215.136.68.134
                                Jan 14, 2025 21:16:23.019342899 CET50297445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:23.023549080 CET44550298215.136.68.134192.168.2.6
                                Jan 14, 2025 21:16:23.023629904 CET50298445192.168.2.6215.136.68.134
                                Jan 14, 2025 21:16:23.023673058 CET50298445192.168.2.6215.136.68.134
                                Jan 14, 2025 21:16:23.023863077 CET50299445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:23.024120092 CET4455029784.23.243.1192.168.2.6
                                Jan 14, 2025 21:16:23.025063038 CET50297445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:23.025063038 CET50297445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:23.028626919 CET44550299215.136.68.1192.168.2.6
                                Jan 14, 2025 21:16:23.028691053 CET50299445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:23.028757095 CET44550298215.136.68.134192.168.2.6
                                Jan 14, 2025 21:16:23.028779984 CET50299445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:23.028805017 CET50298445192.168.2.6215.136.68.134
                                Jan 14, 2025 21:16:23.029259920 CET50300445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:23.029844999 CET4455029784.23.243.1192.168.2.6
                                Jan 14, 2025 21:16:23.033631086 CET44550299215.136.68.1192.168.2.6
                                Jan 14, 2025 21:16:23.033703089 CET50299445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:23.034104109 CET44550300215.136.68.1192.168.2.6
                                Jan 14, 2025 21:16:23.034182072 CET50300445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:23.034218073 CET50300445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:23.039043903 CET44550300215.136.68.1192.168.2.6
                                Jan 14, 2025 21:16:23.316317081 CET50302445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:23.321145058 CET4455030277.250.55.2192.168.2.6
                                Jan 14, 2025 21:16:23.321307898 CET50302445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:23.321309090 CET50302445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:23.326122999 CET4455030277.250.55.2192.168.2.6
                                Jan 14, 2025 21:16:24.052505970 CET4455010865.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:24.053153038 CET50108445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:24.053221941 CET50108445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:24.053248882 CET50108445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:24.058043957 CET4455010865.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:24.058054924 CET4455010865.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:24.346729040 CET50310445192.168.2.670.15.165.77
                                Jan 14, 2025 21:16:24.351645947 CET4455031070.15.165.77192.168.2.6
                                Jan 14, 2025 21:16:24.351711988 CET50310445192.168.2.670.15.165.77
                                Jan 14, 2025 21:16:24.351772070 CET50310445192.168.2.670.15.165.77
                                Jan 14, 2025 21:16:24.351916075 CET50311445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:24.356713057 CET4455031170.15.165.1192.168.2.6
                                Jan 14, 2025 21:16:24.356782913 CET4455031070.15.165.77192.168.2.6
                                Jan 14, 2025 21:16:24.356792927 CET50311445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:24.356831074 CET50310445192.168.2.670.15.165.77
                                Jan 14, 2025 21:16:24.356906891 CET50311445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:24.357253075 CET50312445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:24.361859083 CET4455031170.15.165.1192.168.2.6
                                Jan 14, 2025 21:16:24.361901999 CET50311445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:24.362076044 CET4455031270.15.165.1192.168.2.6
                                Jan 14, 2025 21:16:24.362133026 CET50312445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:24.362170935 CET50312445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:24.367114067 CET4455031270.15.165.1192.168.2.6
                                Jan 14, 2025 21:16:25.034043074 CET50317445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:25.039082050 CET44550317134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:25.039180040 CET50317445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:25.039249897 CET50317445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:25.044019938 CET44550317134.155.108.1192.168.2.6
                                Jan 14, 2025 21:16:25.596623898 CET50322445192.168.2.6107.63.210.21
                                Jan 14, 2025 21:16:25.601511955 CET44550322107.63.210.21192.168.2.6
                                Jan 14, 2025 21:16:25.601633072 CET50322445192.168.2.6107.63.210.21
                                Jan 14, 2025 21:16:25.601917028 CET50323445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:25.601982117 CET50322445192.168.2.6107.63.210.21
                                Jan 14, 2025 21:16:25.606878042 CET44550323107.63.210.1192.168.2.6
                                Jan 14, 2025 21:16:25.606956005 CET50323445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:25.607028961 CET50323445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:25.607028961 CET44550322107.63.210.21192.168.2.6
                                Jan 14, 2025 21:16:25.607085943 CET50322445192.168.2.6107.63.210.21
                                Jan 14, 2025 21:16:25.607434034 CET50324445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:25.611978054 CET44550323107.63.210.1192.168.2.6
                                Jan 14, 2025 21:16:25.612021923 CET50323445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:25.612343073 CET44550324107.63.210.1192.168.2.6
                                Jan 14, 2025 21:16:25.612399101 CET50324445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:25.612432957 CET50324445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:25.618300915 CET44550324107.63.210.1192.168.2.6
                                Jan 14, 2025 21:16:26.050451994 CET44550143120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:26.050544024 CET50143445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:26.050579071 CET50143445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:26.050628901 CET50143445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:26.055485010 CET44550143120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:26.055495024 CET44550143120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:26.273400068 CET44550147153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:26.273478031 CET50147445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:26.273545980 CET50147445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:26.273607016 CET50147445192.168.2.6153.163.31.1
                                Jan 14, 2025 21:16:26.278422117 CET44550147153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:26.278517008 CET44550147153.163.31.1192.168.2.6
                                Jan 14, 2025 21:16:26.330732107 CET50330445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:26.336198092 CET44550330153.163.31.2192.168.2.6
                                Jan 14, 2025 21:16:26.336321115 CET50330445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:26.336419106 CET50330445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:26.336848974 CET50331445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:26.342154026 CET44550330153.163.31.2192.168.2.6
                                Jan 14, 2025 21:16:26.342168093 CET44550331153.163.31.2192.168.2.6
                                Jan 14, 2025 21:16:26.342247963 CET50330445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:26.342276096 CET50331445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:26.342320919 CET50331445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:26.347373962 CET44550331153.163.31.2192.168.2.6
                                Jan 14, 2025 21:16:26.752945900 CET50334445192.168.2.675.35.171.228
                                Jan 14, 2025 21:16:26.758054972 CET4455033475.35.171.228192.168.2.6
                                Jan 14, 2025 21:16:26.758158922 CET50334445192.168.2.675.35.171.228
                                Jan 14, 2025 21:16:26.758196115 CET50334445192.168.2.675.35.171.228
                                Jan 14, 2025 21:16:26.758323908 CET50335445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:26.763231993 CET4455033575.35.171.1192.168.2.6
                                Jan 14, 2025 21:16:26.763372898 CET50335445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:26.763401985 CET50335445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:26.763534069 CET4455033475.35.171.228192.168.2.6
                                Jan 14, 2025 21:16:26.763595104 CET50334445192.168.2.675.35.171.228
                                Jan 14, 2025 21:16:26.763725996 CET50336445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:26.768750906 CET4455033575.35.171.1192.168.2.6
                                Jan 14, 2025 21:16:26.768784046 CET4455033575.35.171.1192.168.2.6
                                Jan 14, 2025 21:16:26.768815994 CET4455033675.35.171.1192.168.2.6
                                Jan 14, 2025 21:16:26.768846035 CET50335445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:26.768887043 CET50336445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:26.768939972 CET50336445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:26.773797035 CET4455033675.35.171.1192.168.2.6
                                Jan 14, 2025 21:16:27.065068960 CET50339445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:27.069889069 CET4455033965.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:27.069961071 CET50339445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:27.070004940 CET50339445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:27.074724913 CET4455033965.97.172.1192.168.2.6
                                Jan 14, 2025 21:16:27.831154108 CET50340445192.168.2.6219.126.246.69
                                Jan 14, 2025 21:16:27.835949898 CET44550340219.126.246.69192.168.2.6
                                Jan 14, 2025 21:16:27.836039066 CET50340445192.168.2.6219.126.246.69
                                Jan 14, 2025 21:16:27.836195946 CET50340445192.168.2.6219.126.246.69
                                Jan 14, 2025 21:16:27.836647987 CET50341445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:27.841084957 CET44550340219.126.246.69192.168.2.6
                                Jan 14, 2025 21:16:27.841253996 CET50340445192.168.2.6219.126.246.69
                                Jan 14, 2025 21:16:27.841403008 CET44550341219.126.246.1192.168.2.6
                                Jan 14, 2025 21:16:27.841535091 CET50341445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:27.841774940 CET50341445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:27.846141100 CET50342445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:27.846784115 CET44550341219.126.246.1192.168.2.6
                                Jan 14, 2025 21:16:27.846849918 CET50341445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:27.851485968 CET44550342219.126.246.1192.168.2.6
                                Jan 14, 2025 21:16:27.851706982 CET50342445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:27.851706982 CET50342445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:27.856486082 CET44550342219.126.246.1192.168.2.6
                                Jan 14, 2025 21:16:28.079504013 CET4455016062.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:28.079646111 CET50160445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:28.079724073 CET50160445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:28.079782009 CET50160445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:28.084500074 CET4455016062.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:28.084522963 CET4455016062.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:28.315207958 CET44550163151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:28.315362930 CET50163445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:28.315454006 CET50163445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:28.315521955 CET50163445192.168.2.6151.121.73.1
                                Jan 14, 2025 21:16:28.320343018 CET44550163151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:28.320353031 CET44550163151.121.73.1192.168.2.6
                                Jan 14, 2025 21:16:28.377717972 CET50343445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:28.382616043 CET44550343151.121.73.2192.168.2.6
                                Jan 14, 2025 21:16:28.382735014 CET50343445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:28.382781029 CET50343445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:28.383220911 CET50344445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:28.387695074 CET44550343151.121.73.2192.168.2.6
                                Jan 14, 2025 21:16:28.387748957 CET50343445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:28.388008118 CET44550344151.121.73.2192.168.2.6
                                Jan 14, 2025 21:16:28.388066053 CET50344445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:28.388104916 CET50344445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:28.392858028 CET44550344151.121.73.2192.168.2.6
                                Jan 14, 2025 21:16:28.846735954 CET50345445192.168.2.6189.143.20.0
                                Jan 14, 2025 21:16:28.851703882 CET44550345189.143.20.0192.168.2.6
                                Jan 14, 2025 21:16:28.851867914 CET50345445192.168.2.6189.143.20.0
                                Jan 14, 2025 21:16:28.851891994 CET50345445192.168.2.6189.143.20.0
                                Jan 14, 2025 21:16:28.852060080 CET50346445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:28.856873035 CET44550346189.143.20.1192.168.2.6
                                Jan 14, 2025 21:16:28.856899977 CET44550345189.143.20.0192.168.2.6
                                Jan 14, 2025 21:16:28.856990099 CET50345445192.168.2.6189.143.20.0
                                Jan 14, 2025 21:16:28.857542992 CET50347445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:28.857606888 CET50346445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:28.857606888 CET50346445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:28.862405062 CET44550347189.143.20.1192.168.2.6
                                Jan 14, 2025 21:16:28.862507105 CET50347445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:28.862535954 CET44550346189.143.20.1192.168.2.6
                                Jan 14, 2025 21:16:28.862580061 CET50346445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:28.865847111 CET50347445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:28.870743036 CET44550347189.143.20.1192.168.2.6
                                Jan 14, 2025 21:16:29.065175056 CET50348445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:29.070063114 CET44550348120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:29.070156097 CET50348445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:29.070235968 CET50348445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:29.074970961 CET44550348120.51.196.1192.168.2.6
                                Jan 14, 2025 21:16:29.784113884 CET50349445192.168.2.612.199.162.33
                                Jan 14, 2025 21:16:29.788970947 CET4455034912.199.162.33192.168.2.6
                                Jan 14, 2025 21:16:29.789067030 CET50349445192.168.2.612.199.162.33
                                Jan 14, 2025 21:16:29.789164066 CET50349445192.168.2.612.199.162.33
                                Jan 14, 2025 21:16:29.789403915 CET50350445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:29.794028044 CET4455034912.199.162.33192.168.2.6
                                Jan 14, 2025 21:16:29.794084072 CET50349445192.168.2.612.199.162.33
                                Jan 14, 2025 21:16:29.794243097 CET4455035012.199.162.1192.168.2.6
                                Jan 14, 2025 21:16:29.794303894 CET50350445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:29.794336081 CET50350445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:29.794620037 CET50351445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:29.799396038 CET4455035112.199.162.1192.168.2.6
                                Jan 14, 2025 21:16:29.799463987 CET50351445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:29.799525023 CET50351445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:29.799762011 CET4455035012.199.162.1192.168.2.6
                                Jan 14, 2025 21:16:29.799817085 CET50350445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:29.804312944 CET4455035112.199.162.1192.168.2.6
                                Jan 14, 2025 21:16:30.079442024 CET4455017886.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:30.079524040 CET50178445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:30.079619884 CET50178445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:30.079716921 CET50178445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:30.084362984 CET4455017886.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:30.084439993 CET4455017886.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:30.331811905 CET4455018054.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:30.331988096 CET50180445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:30.332058907 CET50180445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:30.332142115 CET50180445192.168.2.654.89.210.1
                                Jan 14, 2025 21:16:30.336818933 CET4455018054.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:30.336880922 CET4455018054.89.210.1192.168.2.6
                                Jan 14, 2025 21:16:30.393321991 CET50353445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:30.398188114 CET4455035354.89.210.2192.168.2.6
                                Jan 14, 2025 21:16:30.398310900 CET50353445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:30.398408890 CET50353445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:30.398863077 CET50354445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:30.403727055 CET4455035354.89.210.2192.168.2.6
                                Jan 14, 2025 21:16:30.403745890 CET4455035454.89.210.2192.168.2.6
                                Jan 14, 2025 21:16:30.403829098 CET50353445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:30.403861046 CET50354445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:30.403908014 CET50354445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:30.408710957 CET4455035454.89.210.2192.168.2.6
                                Jan 14, 2025 21:16:30.659037113 CET50355445192.168.2.626.28.204.104
                                Jan 14, 2025 21:16:30.663830042 CET4455035526.28.204.104192.168.2.6
                                Jan 14, 2025 21:16:30.663928032 CET50355445192.168.2.626.28.204.104
                                Jan 14, 2025 21:16:30.663985014 CET50355445192.168.2.626.28.204.104
                                Jan 14, 2025 21:16:30.664274931 CET50356445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:30.668879986 CET4455035526.28.204.104192.168.2.6
                                Jan 14, 2025 21:16:30.668930054 CET50355445192.168.2.626.28.204.104
                                Jan 14, 2025 21:16:30.669085026 CET4455035626.28.204.1192.168.2.6
                                Jan 14, 2025 21:16:30.669212103 CET50356445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:30.669297934 CET50356445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:30.669648886 CET50357445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:30.674300909 CET4455035626.28.204.1192.168.2.6
                                Jan 14, 2025 21:16:30.674401045 CET50356445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:30.674412966 CET4455035726.28.204.1192.168.2.6
                                Jan 14, 2025 21:16:30.674503088 CET50357445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:30.674688101 CET50357445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:30.679467916 CET4455035726.28.204.1192.168.2.6
                                Jan 14, 2025 21:16:31.081918001 CET50358445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:31.086766958 CET4455035862.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:31.086862087 CET50358445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:31.086889029 CET50358445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:31.091667891 CET4455035862.31.110.1192.168.2.6
                                Jan 14, 2025 21:16:31.513613939 CET50359445192.168.2.691.135.242.198
                                Jan 14, 2025 21:16:31.518490076 CET4455035991.135.242.198192.168.2.6
                                Jan 14, 2025 21:16:31.518610001 CET50359445192.168.2.691.135.242.198
                                Jan 14, 2025 21:16:31.518610001 CET50359445192.168.2.691.135.242.198
                                Jan 14, 2025 21:16:31.519149065 CET50360445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:31.523696899 CET4455035991.135.242.198192.168.2.6
                                Jan 14, 2025 21:16:31.523758888 CET50359445192.168.2.691.135.242.198
                                Jan 14, 2025 21:16:31.523921013 CET4455036091.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:31.523977041 CET50360445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:31.524091959 CET50360445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:31.524828911 CET50361445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:31.528956890 CET4455036091.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:31.529028893 CET50360445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:31.529670954 CET4455036191.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:31.529737949 CET50361445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:31.529794931 CET50361445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:31.534574986 CET4455036191.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:32.284450054 CET50362445192.168.2.6109.201.45.47
                                Jan 14, 2025 21:16:32.289490938 CET44550362109.201.45.47192.168.2.6
                                Jan 14, 2025 21:16:32.289606094 CET50362445192.168.2.6109.201.45.47
                                Jan 14, 2025 21:16:32.289623022 CET50362445192.168.2.6109.201.45.47
                                Jan 14, 2025 21:16:32.289767981 CET50363445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:32.294598103 CET44550363109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:32.294661045 CET50363445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:32.294706106 CET50363445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:32.295197010 CET50364445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:32.296359062 CET44550362109.201.45.47192.168.2.6
                                Jan 14, 2025 21:16:32.300086975 CET44550364109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:32.300160885 CET50364445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:32.300193071 CET50364445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:32.300302029 CET44550363109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:32.305047989 CET44550364109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:32.310482979 CET44550362109.201.45.47192.168.2.6
                                Jan 14, 2025 21:16:32.310646057 CET50362445192.168.2.6109.201.45.47
                                Jan 14, 2025 21:16:32.310920954 CET44550363109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:32.310993910 CET50363445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:32.314341068 CET4455019552.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:32.314428091 CET50195445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:32.314470053 CET50195445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:32.314515114 CET50195445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:32.319338083 CET4455019552.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:32.319350004 CET4455019552.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:32.331641912 CET44550194155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:32.331743956 CET50194445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:32.331834078 CET50194445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:32.332039118 CET50194445192.168.2.6155.86.254.1
                                Jan 14, 2025 21:16:32.336607933 CET44550194155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:32.336850882 CET44550194155.86.254.1192.168.2.6
                                Jan 14, 2025 21:16:32.393347979 CET50365445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:32.398197889 CET44550365155.86.254.2192.168.2.6
                                Jan 14, 2025 21:16:32.398324966 CET50365445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:32.398412943 CET50365445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:32.399024010 CET50366445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:32.403477907 CET44550365155.86.254.2192.168.2.6
                                Jan 14, 2025 21:16:32.403548002 CET50365445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:32.403893948 CET44550366155.86.254.2192.168.2.6
                                Jan 14, 2025 21:16:32.403999090 CET50366445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:32.404043913 CET50366445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:32.408804893 CET44550366155.86.254.2192.168.2.6
                                Jan 14, 2025 21:16:33.080761909 CET50368445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:33.086191893 CET4455036886.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:33.086306095 CET50368445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:33.086306095 CET50368445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:33.091790915 CET4455036886.201.63.1192.168.2.6
                                Jan 14, 2025 21:16:33.365181923 CET4455036191.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:33.365437031 CET50361445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:33.365437031 CET50361445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:33.365437031 CET50361445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:33.370387077 CET4455036191.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:33.370398998 CET4455036191.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:34.175853968 CET4455021180.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:34.175920010 CET50211445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:34.175950050 CET50211445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:34.175987005 CET50211445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:34.180793047 CET4455021180.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:34.180804968 CET4455021180.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:34.226543903 CET44550364109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:34.226716995 CET50364445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:34.226716995 CET50364445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:34.226763010 CET50364445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:34.231631041 CET44550364109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:34.231645107 CET44550364109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:34.331657887 CET4455021244.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:34.331765890 CET50212445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:34.331821918 CET50212445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:34.331888914 CET50212445192.168.2.644.206.62.1
                                Jan 14, 2025 21:16:34.336926937 CET4455021244.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:34.337029934 CET4455021244.206.62.1192.168.2.6
                                Jan 14, 2025 21:16:34.393318892 CET50372445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:34.398350954 CET4455037244.206.62.2192.168.2.6
                                Jan 14, 2025 21:16:34.398504972 CET50372445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:34.398530006 CET50372445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:34.399055004 CET50373445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:34.403831959 CET4455037244.206.62.2192.168.2.6
                                Jan 14, 2025 21:16:34.403908014 CET50372445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:34.404185057 CET4455037344.206.62.2192.168.2.6
                                Jan 14, 2025 21:16:34.404246092 CET50373445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:34.404313087 CET50373445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:34.409527063 CET4455037344.206.62.2192.168.2.6
                                Jan 14, 2025 21:16:35.315092087 CET50377445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:35.319925070 CET4455037752.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:35.320013046 CET50377445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:35.320080042 CET50377445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:35.324812889 CET4455037752.95.229.1192.168.2.6
                                Jan 14, 2025 21:16:36.208972931 CET4455022749.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:36.209041119 CET50227445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:36.212198973 CET50227445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:36.212248087 CET50227445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:36.217041016 CET4455022749.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:36.217051983 CET4455022749.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:36.331382036 CET44550230191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:36.331491947 CET50230445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:36.331609011 CET50230445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:36.331677914 CET50230445192.168.2.6191.66.41.1
                                Jan 14, 2025 21:16:36.336373091 CET44550230191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:36.336464882 CET44550230191.66.41.1192.168.2.6
                                Jan 14, 2025 21:16:36.378058910 CET50384445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:36.382909060 CET4455038491.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:36.382994890 CET50384445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:36.383063078 CET50384445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:36.387882948 CET4455038491.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:36.394059896 CET50385445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:36.399009943 CET44550385191.66.41.2192.168.2.6
                                Jan 14, 2025 21:16:36.399080038 CET50385445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:36.399163008 CET50385445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:36.399566889 CET50386445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:36.404129028 CET44550385191.66.41.2192.168.2.6
                                Jan 14, 2025 21:16:36.404179096 CET50385445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:36.404453039 CET44550386191.66.41.2192.168.2.6
                                Jan 14, 2025 21:16:36.404516935 CET50386445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:36.404561043 CET50386445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:36.409502983 CET44550386191.66.41.2192.168.2.6
                                Jan 14, 2025 21:16:37.190138102 CET50394445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:37.195188046 CET4455039480.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:37.195338011 CET50394445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:37.195338011 CET50394445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:37.200170040 CET4455039480.105.222.1192.168.2.6
                                Jan 14, 2025 21:16:37.236814022 CET50395445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:37.241703033 CET44550395109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:37.241780996 CET50395445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:37.241802931 CET50395445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:37.246587992 CET44550395109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:38.050879002 CET4455024451.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:38.050945044 CET50244445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:38.050991058 CET50244445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:38.051023960 CET50244445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:38.055912971 CET4455024451.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:38.055924892 CET4455024451.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:38.240689039 CET4455038491.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:38.240768909 CET50384445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:38.240819931 CET50384445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:38.240983963 CET50384445192.168.2.691.135.242.1
                                Jan 14, 2025 21:16:38.245558023 CET4455038491.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:38.245739937 CET4455038491.135.242.1192.168.2.6
                                Jan 14, 2025 21:16:38.299767017 CET50407445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:38.304614067 CET4455040791.135.242.2192.168.2.6
                                Jan 14, 2025 21:16:38.304735899 CET50407445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:38.304768085 CET50407445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:38.305084944 CET50408445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:38.309875965 CET4455040891.135.242.2192.168.2.6
                                Jan 14, 2025 21:16:38.309951067 CET50408445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:38.309978962 CET50408445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:38.314780951 CET4455040891.135.242.2192.168.2.6
                                Jan 14, 2025 21:16:38.314809084 CET4455040791.135.242.2192.168.2.6
                                Jan 14, 2025 21:16:38.314868927 CET50407445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:39.146997929 CET44550395109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:39.149878979 CET50395445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:39.150063992 CET50395445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:39.150111914 CET50395445192.168.2.6109.201.45.1
                                Jan 14, 2025 21:16:39.154896975 CET44550395109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:39.154917002 CET44550395109.201.45.1192.168.2.6
                                Jan 14, 2025 21:16:39.205652952 CET50420445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:39.210583925 CET44550420109.201.45.2192.168.2.6
                                Jan 14, 2025 21:16:39.211497068 CET50420445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:39.211597919 CET50420445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:39.211980104 CET50421445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:39.216552973 CET44550420109.201.45.2192.168.2.6
                                Jan 14, 2025 21:16:39.216782093 CET44550421109.201.45.2192.168.2.6
                                Jan 14, 2025 21:16:39.216836929 CET50420445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:39.216867924 CET50421445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:39.216917992 CET50421445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:39.221158028 CET50422445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:39.221685886 CET44550421109.201.45.2192.168.2.6
                                Jan 14, 2025 21:16:39.226032019 CET4455042249.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:39.226139069 CET50422445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:39.226139069 CET50422445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:39.230959892 CET4455042249.6.27.1192.168.2.6
                                Jan 14, 2025 21:16:39.845941067 CET44550258200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:39.846116066 CET50258445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:39.846168995 CET50258445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:39.846209049 CET50258445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:39.851138115 CET44550258200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:39.851151943 CET44550258200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:40.441505909 CET445502634.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:40.441587925 CET50263445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:40.441622972 CET50263445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:40.441648960 CET50263445192.168.2.64.233.82.1
                                Jan 14, 2025 21:16:40.446464062 CET445502634.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:40.446476936 CET445502634.233.82.1192.168.2.6
                                Jan 14, 2025 21:16:40.503119946 CET50447445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:40.508079052 CET445504474.233.82.2192.168.2.6
                                Jan 14, 2025 21:16:40.508215904 CET50447445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:40.508311033 CET50447445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:40.508724928 CET50448445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:40.513356924 CET445504474.233.82.2192.168.2.6
                                Jan 14, 2025 21:16:40.513438940 CET50447445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:40.513516903 CET445504484.233.82.2192.168.2.6
                                Jan 14, 2025 21:16:40.513581038 CET50448445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:40.513632059 CET50448445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:40.518390894 CET445504484.233.82.2192.168.2.6
                                Jan 14, 2025 21:16:41.065083981 CET50462445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:41.069950104 CET4455046251.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:41.070075035 CET50462445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:41.070143938 CET50462445192.168.2.651.152.12.1
                                Jan 14, 2025 21:16:41.074898958 CET4455046251.152.12.1192.168.2.6
                                Jan 14, 2025 21:16:41.439621925 CET4455027352.131.121.1192.168.2.6
                                Jan 14, 2025 21:16:41.439712048 CET50273445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:41.440301895 CET50273445192.168.2.652.131.121.1
                                Jan 14, 2025 21:16:41.445116043 CET4455027352.131.121.1192.168.2.6
                                Jan 14, 2025 21:16:42.568828106 CET44550280157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:42.570244074 CET50280445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:42.570327044 CET50280445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:42.570327044 CET50280445192.168.2.6157.44.49.1
                                Jan 14, 2025 21:16:42.575174093 CET44550280157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:42.575191021 CET44550280157.44.49.1192.168.2.6
                                Jan 14, 2025 21:16:42.627666950 CET50506445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:42.632704020 CET44550506157.44.49.2192.168.2.6
                                Jan 14, 2025 21:16:42.632808924 CET50506445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:42.632833958 CET50506445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:42.633328915 CET50507445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:42.637909889 CET44550506157.44.49.2192.168.2.6
                                Jan 14, 2025 21:16:42.637974977 CET50506445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:42.638154984 CET44550507157.44.49.2192.168.2.6
                                Jan 14, 2025 21:16:42.638219118 CET50507445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:42.638248920 CET50507445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:42.643131971 CET44550507157.44.49.2192.168.2.6
                                Jan 14, 2025 21:16:42.861833096 CET50520445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:42.867400885 CET44550520200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:42.867494106 CET50520445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:42.867535114 CET50520445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:42.873305082 CET44550520200.186.41.1192.168.2.6
                                Jan 14, 2025 21:16:42.987380981 CET44550287186.79.150.1192.168.2.6
                                Jan 14, 2025 21:16:42.987446070 CET50287445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:42.987504959 CET50287445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:42.987535000 CET50287445192.168.2.6186.79.150.1
                                Jan 14, 2025 21:16:42.992276907 CET44550287186.79.150.1192.168.2.6
                                Jan 14, 2025 21:16:42.992288113 CET44550287186.79.150.1192.168.2.6
                                Jan 14, 2025 21:16:44.408977985 CET44550300215.136.68.1192.168.2.6
                                Jan 14, 2025 21:16:44.409069061 CET50300445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:44.423969030 CET4455029784.23.243.1192.168.2.6
                                Jan 14, 2025 21:16:44.424024105 CET50297445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:44.689332962 CET4455030277.250.55.2192.168.2.6
                                Jan 14, 2025 21:16:44.689408064 CET50302445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:44.948359013 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:44.948398113 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:44.948472977 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:44.949116945 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:44.949130058 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.736557007 CET4455031270.15.165.1192.168.2.6
                                Jan 14, 2025 21:16:45.736748934 CET50312445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:45.773005009 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.773087025 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.775331974 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.775338888 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.775576115 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.777586937 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.777853966 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.777859926 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.778064966 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.819334030 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.957206011 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.957295895 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.957577944 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.957843065 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.957843065 CET50639443192.168.2.640.113.110.67
                                Jan 14, 2025 21:16:45.957863092 CET4435063940.113.110.67192.168.2.6
                                Jan 14, 2025 21:16:45.972537994 CET50339445192.168.2.665.97.172.1
                                Jan 14, 2025 21:16:45.972585917 CET50348445192.168.2.6120.51.196.1
                                Jan 14, 2025 21:16:45.972675085 CET50344445192.168.2.6151.121.73.2
                                Jan 14, 2025 21:16:45.972733974 CET50366445192.168.2.6155.86.254.2
                                Jan 14, 2025 21:16:45.972748995 CET50422445192.168.2.649.6.27.1
                                Jan 14, 2025 21:16:45.972848892 CET50297445192.168.2.684.23.243.1
                                Jan 14, 2025 21:16:45.972870111 CET50300445192.168.2.6215.136.68.1
                                Jan 14, 2025 21:16:45.972944021 CET50312445192.168.2.670.15.165.1
                                Jan 14, 2025 21:16:45.972979069 CET50317445192.168.2.6134.155.108.1
                                Jan 14, 2025 21:16:45.972986937 CET50324445192.168.2.6107.63.210.1
                                Jan 14, 2025 21:16:45.973084927 CET50302445192.168.2.677.250.55.2
                                Jan 14, 2025 21:16:45.973087072 CET50336445192.168.2.675.35.171.1
                                Jan 14, 2025 21:16:45.973087072 CET50342445192.168.2.6219.126.246.1
                                Jan 14, 2025 21:16:45.973140001 CET50331445192.168.2.6153.163.31.2
                                Jan 14, 2025 21:16:45.973144054 CET50347445192.168.2.6189.143.20.1
                                Jan 14, 2025 21:16:45.973144054 CET50351445192.168.2.612.199.162.1
                                Jan 14, 2025 21:16:45.973160982 CET50354445192.168.2.654.89.210.2
                                Jan 14, 2025 21:16:45.973233938 CET50357445192.168.2.626.28.204.1
                                Jan 14, 2025 21:16:45.973263979 CET50358445192.168.2.662.31.110.1
                                Jan 14, 2025 21:16:45.973294973 CET50408445192.168.2.691.135.242.2
                                Jan 14, 2025 21:16:45.973342896 CET50421445192.168.2.6109.201.45.2
                                Jan 14, 2025 21:16:45.973377943 CET50377445192.168.2.652.95.229.1
                                Jan 14, 2025 21:16:45.973380089 CET50368445192.168.2.686.201.63.1
                                Jan 14, 2025 21:16:45.973402977 CET50373445192.168.2.644.206.62.2
                                Jan 14, 2025 21:16:45.973429918 CET50386445192.168.2.6191.66.41.2
                                Jan 14, 2025 21:16:45.973506927 CET50520445192.168.2.6200.186.41.1
                                Jan 14, 2025 21:16:45.973531961 CET50448445192.168.2.64.233.82.2
                                Jan 14, 2025 21:16:45.973683119 CET50507445192.168.2.6157.44.49.2
                                Jan 14, 2025 21:16:45.974153996 CET50394445192.168.2.680.105.222.1
                                Jan 14, 2025 21:16:45.974153996 CET50462445192.168.2.651.152.12.1
                                Jan 14, 2025 21:17:12.158981085 CET49703443192.168.2.620.190.159.4
                                Jan 14, 2025 21:17:12.158997059 CET4970480192.168.2.62.16.168.102
                                Jan 14, 2025 21:17:12.164083958 CET4434970320.190.159.4192.168.2.6
                                Jan 14, 2025 21:17:12.164202929 CET49703443192.168.2.620.190.159.4
                                Jan 14, 2025 21:17:12.164661884 CET80497042.16.168.102192.168.2.6
                                Jan 14, 2025 21:17:12.164735079 CET4970480192.168.2.62.16.168.102
                                Jan 14, 2025 21:17:12.572305918 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:12.572412014 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:12.572515965 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:12.573131084 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:12.573165894 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.389688969 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.389915943 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:13.393387079 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:13.393407106 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.393662930 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.395514011 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:13.395569086 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:13.395576954 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.395673990 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:13.443334103 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.569948912 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.570036888 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:13.570096970 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:13.570223093 CET50641443192.168.2.640.113.110.67
                                Jan 14, 2025 21:17:13.570240974 CET4435064140.113.110.67192.168.2.6
                                Jan 14, 2025 21:17:14.924356937 CET49707443192.168.2.620.190.159.4
                                Jan 14, 2025 21:17:14.929651976 CET4434970720.190.159.4192.168.2.6
                                Jan 14, 2025 21:17:14.929721117 CET49707443192.168.2.620.190.159.4
                                Jan 14, 2025 21:17:46.012190104 CET5064280192.168.2.6104.16.166.228
                                Jan 14, 2025 21:17:46.017379045 CET8050642104.16.166.228192.168.2.6
                                Jan 14, 2025 21:17:46.017474890 CET5064280192.168.2.6104.16.166.228
                                Jan 14, 2025 21:17:46.017600060 CET5064280192.168.2.6104.16.166.228
                                Jan 14, 2025 21:17:46.022424936 CET8050642104.16.166.228192.168.2.6
                                Jan 14, 2025 21:17:46.510979891 CET8050642104.16.166.228192.168.2.6
                                Jan 14, 2025 21:17:46.511394024 CET8050642104.16.166.228192.168.2.6
                                Jan 14, 2025 21:17:46.511478901 CET5064280192.168.2.6104.16.166.228
                                Jan 14, 2025 21:17:46.511571884 CET5064280192.168.2.6104.16.166.228
                                Jan 14, 2025 21:17:46.516405106 CET8050642104.16.166.228192.168.2.6
                                Jan 14, 2025 21:17:46.519073009 CET50643445192.168.2.6115.83.159.245
                                Jan 14, 2025 21:17:46.523853064 CET44550643115.83.159.245192.168.2.6
                                Jan 14, 2025 21:17:46.525007010 CET50643445192.168.2.6115.83.159.245
                                Jan 14, 2025 21:17:46.525031090 CET50643445192.168.2.6115.83.159.245
                                Jan 14, 2025 21:17:46.525188923 CET50645445192.168.2.6115.83.159.1
                                Jan 14, 2025 21:17:46.529946089 CET44550645115.83.159.1192.168.2.6
                                Jan 14, 2025 21:17:46.530067921 CET44550643115.83.159.245192.168.2.6
                                Jan 14, 2025 21:17:46.530127048 CET50643445192.168.2.6115.83.159.245
                                Jan 14, 2025 21:17:46.530138969 CET50645445192.168.2.6115.83.159.1
                                Jan 14, 2025 21:17:46.530183077 CET50645445192.168.2.6115.83.159.1
                                Jan 14, 2025 21:17:46.530416012 CET50647445192.168.2.6115.83.159.1
                                Jan 14, 2025 21:17:46.535191059 CET44550647115.83.159.1192.168.2.6
                                Jan 14, 2025 21:17:46.535270929 CET50647445192.168.2.6115.83.159.1
                                Jan 14, 2025 21:17:46.535301924 CET50647445192.168.2.6115.83.159.1
                                Jan 14, 2025 21:17:46.535501957 CET44550645115.83.159.1192.168.2.6
                                Jan 14, 2025 21:17:46.535556078 CET50645445192.168.2.6115.83.159.1
                                Jan 14, 2025 21:17:46.540096045 CET44550647115.83.159.1192.168.2.6
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 14, 2025 21:15:38.804143906 CET6268553192.168.2.61.1.1.1
                                Jan 14, 2025 21:15:38.813579082 CET53626851.1.1.1192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jan 14, 2025 21:15:38.804143906 CET192.168.2.61.1.1.10x56ffStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jan 14, 2025 21:15:38.813579082 CET1.1.1.1192.168.2.60x56ffNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                                Jan 14, 2025 21:15:38.813579082 CET1.1.1.1192.168.2.60x56ffNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                                • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.649709104.16.166.228806600C:\Windows\mssecsvc.exe
                                TimestampBytes transferredDirectionData
                                Jan 14, 2025 21:15:38.827069044 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 14, 2025 21:15:39.314125061 CET778INHTTP/1.1 200 OK
                                Date: Tue, 14 Jan 2025 20:15:39 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 90204c9e4afa7286-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.649711104.16.166.228806036C:\Windows\mssecsvc.exe
                                TimestampBytes transferredDirectionData
                                Jan 14, 2025 21:15:39.920974970 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 14, 2025 21:15:40.422864914 CET778INHTTP/1.1 200 OK
                                Date: Tue, 14 Jan 2025 20:15:40 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 90204ca52ed372b7-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.649728104.16.166.228801584C:\Windows\mssecsvc.exe
                                TimestampBytes transferredDirectionData
                                Jan 14, 2025 21:15:41.186252117 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 14, 2025 21:15:41.688304901 CET778INHTTP/1.1 200 OK
                                Date: Tue, 14 Jan 2025 20:15:41 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 90204cad18a84402-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Session IDSource IPSource PortDestination IPDestination Port
                                3192.168.2.650642104.16.166.22880
                                TimestampBytes transferredDirectionData
                                Jan 14, 2025 21:17:46.017600060 CET100OUTGET / HTTP/1.1
                                Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                Cache-Control: no-cache
                                Jan 14, 2025 21:17:46.510979891 CET778INHTTP/1.1 200 OK
                                Date: Tue, 14 Jan 2025 20:17:46 GMT
                                Content-Type: text/html
                                Content-Length: 607
                                Connection: close
                                Server: cloudflare
                                CF-RAY: 90204fb91b353320-EWR
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                                Session IDSource IPSource PortDestination IPDestination Port
                                0192.168.2.64971040.113.110.67443
                                TimestampBytes transferredDirectionData
                                2025-01-14 20:15:40 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 68 48 4d 71 50 73 75 61 43 45 32 54 61 7a 65 72 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 31 61 63 31 65 65 35 36 66 39 39 30 35 35 36 0d 0a 0d 0a
                                Data Ascii: CNT 1 CON 305MS-CV: hHMqPsuaCE2Tazer.1Context: 11ac1ee56f990556
                                2025-01-14 20:15:40 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                2025-01-14 20:15:40 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 68 48 4d 71 50 73 75 61 43 45 32 54 61 7a 65 72 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 31 61 63 31 65 65 35 36 66 39 39 30 35 35 36 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 4c 4c 30 4e 53 6d 4f 42 64 4f 6b 70 6a 58 44 41 52 56 76 45 62 2f 45 58 55 6b 76 59 52 78 72 65 38 42 44 52 2b 47 69 64 72 4f 39 35 34 34 70 56 38 4f 71 6b 50 53 42 76 71 48 38 66 58 33 64 72 67 38 74 34 6b 41 30 67 50 4d 6f 73 32 64 50 6c 58 30 52 33 57 6e 57 58 71 54 77 63 75 59 4d 55 39 59 72 35 56 4a 6c 7a 30 45 58 55
                                Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: hHMqPsuaCE2Tazer.2Context: 11ac1ee56f990556<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbLL0NSmOBdOkpjXDARVvEb/EXUkvYRxre8BDR+GidrO9544pV8OqkPSBvqH8fX3drg8t4kA0gPMos2dPlX0R3WnWXqTwcuYMU9Yr5VJlz0EXU
                                2025-01-14 20:15:40 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 68 48 4d 71 50 73 75 61 43 45 32 54 61 7a 65 72 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 31 61 63 31 65 65 35 36 66 39 39 30 35 35 36 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                Data Ascii: BND 3 CON\WNS 0 197MS-CV: hHMqPsuaCE2Tazer.3Context: 11ac1ee56f990556<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                2025-01-14 20:15:40 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                Data Ascii: 202 1 CON 58
                                2025-01-14 20:15:40 UTC58INData Raw: 4d 53 2d 43 56 3a 20 51 65 57 51 51 42 78 42 4c 6b 43 5a 77 72 55 4a 63 49 73 42 74 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                Data Ascii: MS-CV: QeWQQBxBLkCZwrUJcIsBtQ.0Payload parsing failed.


                                Session IDSource IPSource PortDestination IPDestination Port
                                1192.168.2.64982540.113.110.67443
                                TimestampBytes transferredDirectionData
                                2025-01-14 20:15:48 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4e 6b 71 75 33 42 52 55 48 45 32 47 74 57 44 54 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 38 33 61 39 63 66 39 33 64 66 64 33 32 66 66 0d 0a 0d 0a
                                Data Ascii: CNT 1 CON 305MS-CV: Nkqu3BRUHE2GtWDT.1Context: e83a9cf93dfd32ff
                                2025-01-14 20:15:48 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                2025-01-14 20:15:48 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4e 6b 71 75 33 42 52 55 48 45 32 47 74 57 44 54 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 38 33 61 39 63 66 39 33 64 66 64 33 32 66 66 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 4c 4c 30 4e 53 6d 4f 42 64 4f 6b 70 6a 58 44 41 52 56 76 45 62 2f 45 58 55 6b 76 59 52 78 72 65 38 42 44 52 2b 47 69 64 72 4f 39 35 34 34 70 56 38 4f 71 6b 50 53 42 76 71 48 38 66 58 33 64 72 67 38 74 34 6b 41 30 67 50 4d 6f 73 32 64 50 6c 58 30 52 33 57 6e 57 58 71 54 77 63 75 59 4d 55 39 59 72 35 56 4a 6c 7a 30 45 58 55
                                Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: Nkqu3BRUHE2GtWDT.2Context: e83a9cf93dfd32ff<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbLL0NSmOBdOkpjXDARVvEb/EXUkvYRxre8BDR+GidrO9544pV8OqkPSBvqH8fX3drg8t4kA0gPMos2dPlX0R3WnWXqTwcuYMU9Yr5VJlz0EXU
                                2025-01-14 20:15:48 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4e 6b 71 75 33 42 52 55 48 45 32 47 74 57 44 54 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 38 33 61 39 63 66 39 33 64 66 64 33 32 66 66 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                Data Ascii: BND 3 CON\WNS 0 197MS-CV: Nkqu3BRUHE2GtWDT.3Context: e83a9cf93dfd32ff<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                2025-01-14 20:15:48 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                Data Ascii: 202 1 CON 58
                                2025-01-14 20:15:48 UTC58INData Raw: 4d 53 2d 43 56 3a 20 2b 42 37 48 41 33 75 69 6c 45 75 35 79 74 6a 76 7a 43 57 6c 2f 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                Data Ascii: MS-CV: +B7HA3uilEu5ytjvzCWl/Q.0Payload parsing failed.


                                Session IDSource IPSource PortDestination IPDestination Port
                                2192.168.2.65005440.113.110.67443
                                TimestampBytes transferredDirectionData
                                2025-01-14 20:16:00 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 52 6c 2f 6b 66 6f 34 4c 4c 6b 43 50 6d 78 51 64 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 31 33 36 66 63 38 32 32 64 64 65 32 34 62 64 0d 0a 0d 0a
                                Data Ascii: CNT 1 CON 305MS-CV: Rl/kfo4LLkCPmxQd.1Context: 8136fc822dde24bd
                                2025-01-14 20:16:00 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                2025-01-14 20:16:00 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 52 6c 2f 6b 66 6f 34 4c 4c 6b 43 50 6d 78 51 64 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 31 33 36 66 63 38 32 32 64 64 65 32 34 62 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 4c 4c 30 4e 53 6d 4f 42 64 4f 6b 70 6a 58 44 41 52 56 76 45 62 2f 45 58 55 6b 76 59 52 78 72 65 38 42 44 52 2b 47 69 64 72 4f 39 35 34 34 70 56 38 4f 71 6b 50 53 42 76 71 48 38 66 58 33 64 72 67 38 74 34 6b 41 30 67 50 4d 6f 73 32 64 50 6c 58 30 52 33 57 6e 57 58 71 54 77 63 75 59 4d 55 39 59 72 35 56 4a 6c 7a 30 45 58 55
                                Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: Rl/kfo4LLkCPmxQd.2Context: 8136fc822dde24bd<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbLL0NSmOBdOkpjXDARVvEb/EXUkvYRxre8BDR+GidrO9544pV8OqkPSBvqH8fX3drg8t4kA0gPMos2dPlX0R3WnWXqTwcuYMU9Yr5VJlz0EXU
                                2025-01-14 20:16:00 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 52 6c 2f 6b 66 6f 34 4c 4c 6b 43 50 6d 78 51 64 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 31 33 36 66 63 38 32 32 64 64 65 32 34 62 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                Data Ascii: BND 3 CON\WNS 0 197MS-CV: Rl/kfo4LLkCPmxQd.3Context: 8136fc822dde24bd<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                2025-01-14 20:16:00 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                Data Ascii: 202 1 CON 58
                                2025-01-14 20:16:00 UTC58INData Raw: 4d 53 2d 43 56 3a 20 56 79 36 74 55 33 62 51 4e 6b 6d 54 64 2b 79 39 58 41 51 79 54 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                Data Ascii: MS-CV: Vy6tU3bQNkmTd+y9XAQyTw.0Payload parsing failed.


                                Session IDSource IPSource PortDestination IPDestination Port
                                3192.168.2.65026540.113.110.67443
                                TimestampBytes transferredDirectionData
                                2025-01-14 20:16:20 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4d 55 53 6d 68 77 67 6a 39 55 69 6c 50 4d 57 33 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 37 34 39 65 65 63 32 37 32 35 64 33 31 35 33 0d 0a 0d 0a
                                Data Ascii: CNT 1 CON 305MS-CV: MUSmhwgj9UilPMW3.1Context: b749eec2725d3153
                                2025-01-14 20:16:20 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                2025-01-14 20:16:20 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4d 55 53 6d 68 77 67 6a 39 55 69 6c 50 4d 57 33 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 37 34 39 65 65 63 32 37 32 35 64 33 31 35 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 4c 4c 30 4e 53 6d 4f 42 64 4f 6b 70 6a 58 44 41 52 56 76 45 62 2f 45 58 55 6b 76 59 52 78 72 65 38 42 44 52 2b 47 69 64 72 4f 39 35 34 34 70 56 38 4f 71 6b 50 53 42 76 71 48 38 66 58 33 64 72 67 38 74 34 6b 41 30 67 50 4d 6f 73 32 64 50 6c 58 30 52 33 57 6e 57 58 71 54 77 63 75 59 4d 55 39 59 72 35 56 4a 6c 7a 30 45 58 55
                                Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: MUSmhwgj9UilPMW3.2Context: b749eec2725d3153<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbLL0NSmOBdOkpjXDARVvEb/EXUkvYRxre8BDR+GidrO9544pV8OqkPSBvqH8fX3drg8t4kA0gPMos2dPlX0R3WnWXqTwcuYMU9Yr5VJlz0EXU
                                2025-01-14 20:16:20 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4d 55 53 6d 68 77 67 6a 39 55 69 6c 50 4d 57 33 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 37 34 39 65 65 63 32 37 32 35 64 33 31 35 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                Data Ascii: BND 3 CON\WNS 0 197MS-CV: MUSmhwgj9UilPMW3.3Context: b749eec2725d3153<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                2025-01-14 20:16:20 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                Data Ascii: 202 1 CON 58
                                2025-01-14 20:16:20 UTC58INData Raw: 4d 53 2d 43 56 3a 20 58 66 53 71 4a 79 34 66 77 30 71 72 31 31 79 45 64 64 56 44 71 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                Data Ascii: MS-CV: XfSqJy4fw0qr11yEddVDqA.0Payload parsing failed.


                                Session IDSource IPSource PortDestination IPDestination Port
                                4192.168.2.65063940.113.110.67443
                                TimestampBytes transferredDirectionData
                                2025-01-14 20:16:45 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6f 38 44 48 67 31 2f 76 31 45 4b 59 55 37 4d 54 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 64 31 39 34 31 65 31 66 61 62 32 33 61 64 62 0d 0a 0d 0a
                                Data Ascii: CNT 1 CON 305MS-CV: o8DHg1/v1EKYU7MT.1Context: ad1941e1fab23adb
                                2025-01-14 20:16:45 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                2025-01-14 20:16:45 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6f 38 44 48 67 31 2f 76 31 45 4b 59 55 37 4d 54 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 64 31 39 34 31 65 31 66 61 62 32 33 61 64 62 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 4c 4c 30 4e 53 6d 4f 42 64 4f 6b 70 6a 58 44 41 52 56 76 45 62 2f 45 58 55 6b 76 59 52 78 72 65 38 42 44 52 2b 47 69 64 72 4f 39 35 34 34 70 56 38 4f 71 6b 50 53 42 76 71 48 38 66 58 33 64 72 67 38 74 34 6b 41 30 67 50 4d 6f 73 32 64 50 6c 58 30 52 33 57 6e 57 58 71 54 77 63 75 59 4d 55 39 59 72 35 56 4a 6c 7a 30 45 58 55
                                Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: o8DHg1/v1EKYU7MT.2Context: ad1941e1fab23adb<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbLL0NSmOBdOkpjXDARVvEb/EXUkvYRxre8BDR+GidrO9544pV8OqkPSBvqH8fX3drg8t4kA0gPMos2dPlX0R3WnWXqTwcuYMU9Yr5VJlz0EXU
                                2025-01-14 20:16:45 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6f 38 44 48 67 31 2f 76 31 45 4b 59 55 37 4d 54 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 64 31 39 34 31 65 31 66 61 62 32 33 61 64 62 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                Data Ascii: BND 3 CON\WNS 0 197MS-CV: o8DHg1/v1EKYU7MT.3Context: ad1941e1fab23adb<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                2025-01-14 20:16:45 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                Data Ascii: 202 1 CON 58
                                2025-01-14 20:16:45 UTC58INData Raw: 4d 53 2d 43 56 3a 20 67 4a 68 73 2f 31 41 73 34 30 79 77 5a 39 30 42 4b 62 54 68 4f 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                Data Ascii: MS-CV: gJhs/1As40ywZ90BKbThOg.0Payload parsing failed.


                                Session IDSource IPSource PortDestination IPDestination Port
                                5192.168.2.65064140.113.110.67443
                                TimestampBytes transferredDirectionData
                                2025-01-14 20:17:13 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 62 46 30 37 37 6d 4e 67 63 55 79 48 7a 6a 47 4a 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 66 65 33 66 30 31 34 32 38 37 38 64 62 62 35 0d 0a 0d 0a
                                Data Ascii: CNT 1 CON 305MS-CV: bF077mNgcUyHzjGJ.1Context: 7fe3f0142878dbb5
                                2025-01-14 20:17:13 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                2025-01-14 20:17:13 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 62 46 30 37 37 6d 4e 67 63 55 79 48 7a 6a 47 4a 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 66 65 33 66 30 31 34 32 38 37 38 64 62 62 35 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 4c 4c 30 4e 53 6d 4f 42 64 4f 6b 70 6a 58 44 41 52 56 76 45 62 2f 45 58 55 6b 76 59 52 78 72 65 38 42 44 52 2b 47 69 64 72 4f 39 35 34 34 70 56 38 4f 71 6b 50 53 42 76 71 48 38 66 58 33 64 72 67 38 74 34 6b 41 30 67 50 4d 6f 73 32 64 50 6c 58 30 52 33 57 6e 57 58 71 54 77 63 75 59 4d 55 39 59 72 35 56 4a 6c 7a 30 45 58 55
                                Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: bF077mNgcUyHzjGJ.2Context: 7fe3f0142878dbb5<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbLL0NSmOBdOkpjXDARVvEb/EXUkvYRxre8BDR+GidrO9544pV8OqkPSBvqH8fX3drg8t4kA0gPMos2dPlX0R3WnWXqTwcuYMU9Yr5VJlz0EXU
                                2025-01-14 20:17:13 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 62 46 30 37 37 6d 4e 67 63 55 79 48 7a 6a 47 4a 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 66 65 33 66 30 31 34 32 38 37 38 64 62 62 35 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                Data Ascii: BND 3 CON\WNS 0 197MS-CV: bF077mNgcUyHzjGJ.3Context: 7fe3f0142878dbb5<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                2025-01-14 20:17:13 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                Data Ascii: 202 1 CON 58
                                2025-01-14 20:17:13 UTC58INData Raw: 4d 53 2d 43 56 3a 20 72 79 6f 70 4f 75 72 45 65 30 75 73 6b 45 55 72 31 6a 70 6d 42 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                Data Ascii: MS-CV: ryopOurEe0uskEUr1jpmBg.0Payload parsing failed.


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:15:15:36
                                Start date:14/01/2025
                                Path:C:\Windows\System32\loaddll32.exe
                                Wow64 process (32bit):true
                                Commandline:loaddll32.exe "C:\Users\user\Desktop\87c6RORO31.dll"
                                Imagebase:0xdf0000
                                File size:126'464 bytes
                                MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:1
                                Start time:15:15:36
                                Start date:14/01/2025
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:15:15:36
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1
                                Imagebase:0x1c0000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:15:15:36
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\rundll32.exe
                                Wow64 process (32bit):true
                                Commandline:rundll32.exe C:\Users\user\Desktop\87c6RORO31.dll,PlayGame
                                Imagebase:0x110000
                                File size:61'440 bytes
                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:15:15:36
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\rundll32.exe
                                Wow64 process (32bit):true
                                Commandline:rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",#1
                                Imagebase:0x110000
                                File size:61'440 bytes
                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:15:15:37
                                Start date:14/01/2025
                                Path:C:\Windows\mssecsvc.exe
                                Wow64 process (32bit):true
                                Commandline:C:\WINDOWS\mssecsvc.exe
                                Imagebase:0x400000
                                File size:3'723'264 bytes
                                MD5 hash:47FE23C22356C88404A7B0B9A508EFFB
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2142701735.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2168056567.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2142847063.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.2142847063.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\mssecsvc.exe, Author: ReversingLabs
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 100%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:8
                                Start time:15:15:38
                                Start date:14/01/2025
                                Path:C:\Windows\mssecsvc.exe
                                Wow64 process (32bit):true
                                Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                Imagebase:0x400000
                                File size:3'723'264 bytes
                                MD5 hash:47FE23C22356C88404A7B0B9A508EFFB
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2156359145.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2807120127.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2807120127.0000000001D7A000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2157691888.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2157691888.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2807700303.000000000229B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2807700303.000000000229B000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                Reputation:low
                                Has exited:true

                                Target ID:9
                                Start time:15:15:39
                                Start date:14/01/2025
                                Path:C:\Windows\tasksche.exe
                                Wow64 process (32bit):false
                                Commandline:C:\WINDOWS\tasksche.exe /i
                                Imagebase:0x400000
                                File size:3'514'368 bytes
                                MD5 hash:087BE2D4C652DD35156789E4044A5815
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.2166950292.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 100%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:10
                                Start time:15:15:39
                                Start date:14/01/2025
                                Path:C:\Windows\SysWOW64\rundll32.exe
                                Wow64 process (32bit):true
                                Commandline:rundll32.exe "C:\Users\user\Desktop\87c6RORO31.dll",PlayGame
                                Imagebase:0x110000
                                File size:61'440 bytes
                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:11
                                Start time:15:15:39
                                Start date:14/01/2025
                                Path:C:\Windows\mssecsvc.exe
                                Wow64 process (32bit):true
                                Commandline:C:\WINDOWS\mssecsvc.exe
                                Imagebase:0x400000
                                File size:3'723'264 bytes
                                MD5 hash:47FE23C22356C88404A7B0B9A508EFFB
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.2185941347.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.2171132694.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.2186106362.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.2186106362.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.2171283947.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.2171283947.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                Reputation:low
                                Has exited:true

                                Target ID:12
                                Start time:15:15:40
                                Start date:14/01/2025
                                Path:C:\Windows\tasksche.exe
                                Wow64 process (32bit):false
                                Commandline:C:\WINDOWS\tasksche.exe /i
                                Imagebase:0x400000
                                File size:3'514'368 bytes
                                MD5 hash:087BE2D4C652DD35156789E4044A5815
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.2181441896.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.2179903924.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                                Reputation:low
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:71.8%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:64.9%
                                  Total number of Nodes:37
                                  Total number of Limit Nodes:9

                                  Callgraph

                                  Control-flow Graph

                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FA30EF0,?,00000000), ref: 00407CEF
                                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                  • sprintf.MSVCRT ref: 00407E01
                                  • sprintf.MSVCRT ref: 00407E18
                                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                  • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                  • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                  • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                  • CreateProcessA.KERNELBASE ref: 00407EE8
                                  • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                  • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2168019000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000006.00000002.2168005821.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168039531.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168103372.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                  • API String ID: 4281112323-1507730452
                                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2168019000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000006.00000002.2168005821.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168039531.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168103372.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                  • String ID:
                                  • API String ID: 801014965-0
                                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                  Control-flow Graph

                                  APIs
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                  Strings
                                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2168019000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000006.00000002.2168005821.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168039531.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168103372.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  • API String ID: 774561529-2942426231
                                  • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                  • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                  Control-flow Graph

                                  APIs
                                  • sprintf.MSVCRT ref: 00407C56
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FA30EF0,00000000), ref: 00407C9B
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2168019000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000006.00000002.2168005821.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168039531.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168103372.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                  • API String ID: 3340711343-4063779371
                                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • __p___argc.MSVCRT ref: 004080A5
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FA30EF0,00000000,?,004081B2), ref: 004080DC
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2168019000.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000006.00000002.2168005821.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168039531.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168056567.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168103372.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.2168194955.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                  • String ID: mssecsvc2.0
                                  • API String ID: 4274534310-3729025388
                                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                  Execution Graph

                                  Execution Coverage:34.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:35
                                  Total number of Limit Nodes:2

                                  Callgraph

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • __p___argc.MSVCRT ref: 004080A5
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                  • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FA30EF0,00000000,?,004081B2), ref: 004080DC
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                  • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                  • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2805527527.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2805501322.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805550437.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805650524.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805675902.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                  • String ID: mssecsvc2.0
                                  • API String ID: 4274534310-3729025388
                                  • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                  • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                  • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                  Control-flow Graph

                                  APIs
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                  • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                  • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                    • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                    • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                  Strings
                                  • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2805527527.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2805501322.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805550437.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805650524.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805675902.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                  • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                  • API String ID: 774561529-2942426231
                                  • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                  • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                  • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                  Control-flow Graph

                                  APIs
                                  • sprintf.MSVCRT ref: 00407C56
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                  • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FA30EF0,00000000), ref: 00407C9B
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2805527527.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2805501322.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805550437.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805650524.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805675902.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                  • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                  • API String ID: 3340711343-4063779371
                                  • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                  • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                  • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FA30EF0,?,00000000), ref: 00407CEF
                                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                  • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                  • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                  • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                  • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                  • sprintf.MSVCRT ref: 00407E01
                                  • sprintf.MSVCRT ref: 00407E18
                                  • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2805527527.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2805501322.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805550437.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805650524.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805675902.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                  • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                  • API String ID: 4072214828-1507730452
                                  • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                  • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                  • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2805527527.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000008.00000002.2805501322.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805550437.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805571444.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805627543.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805650524.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805675902.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A20000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A26000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A29000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A2F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A41000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A44000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A4D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000008.00000002.2805774448.0000000000A56000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                  • String ID:
                                  • API String ID: 801014965-0
                                  • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                  • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                  • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                  APIs
                                  • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: memcpy
                                  • String ID: /../$/..\$\../$\..\
                                  • API String ID: 3510742995-3885502717
                                  • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                  • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                  • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                  • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                  APIs
                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                  • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                  • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                  • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                  • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                  • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                  • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                  • API String ID: 2238633743-2459060434
                                  • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                  • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                  • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                  • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                  • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                  • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandleOpen$ManagerStart
                                  • String ID: cmd.exe /c "%s"
                                  • API String ID: 1485051382-955883872
                                  • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                  • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                  • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                  • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                  • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                  • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                  • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrow$memcpy
                                  • String ID:
                                  • API String ID: 1881450474-3916222277
                                  • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                  • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                  • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                  • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                  APIs
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                  • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                  • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                  • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                  • String ID: WANACRY!
                                  • API String ID: 283026544-1240840912
                                  • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                  • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                  • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                  • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                  • String ID: $Q;@
                                  • API String ID: 2382887404-262343263
                                  • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                  • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                  • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                  • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                  • String ID:
                                  • API String ID: 2382887404-3916222277
                                  • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                  • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                  • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                  • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                  APIs
                                  • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$FreeProcessfree
                                  • String ID:
                                  • API String ID: 3428986607-0
                                  • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                  • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                  • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                  • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrow
                                  • String ID:
                                  • API String ID: 941485209-0
                                  • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                  • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                  • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                  • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrow
                                  • String ID:
                                  • API String ID: 941485209-0
                                  • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                  • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                  • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                  • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: memcpy
                                  • String ID:
                                  • API String ID: 3510742995-0
                                  • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                  • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                  • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                  • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                  APIs
                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ContextCryptRelease
                                  • String ID:
                                  • API String ID: 829835001-0
                                  • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                  • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                  • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                  • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                  • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                  • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                  • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                  • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                  • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                  • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                  APIs
                                    • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                    • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                  • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                  • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                  • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                  • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                  • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                  • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                  • API String ID: 2238633743-1294736154
                                  • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                  • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                  • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                  • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: %s%s$%s%s%s$:$\
                                  • API String ID: 0-1100577047
                                  • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                  • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                  • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                  • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                  APIs
                                  • __p___argv.MSVCRT(0040F538), ref: 00402040
                                  • strcmp.MSVCRT(?), ref: 0040204B
                                  • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                  • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                    • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                  • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                  • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                  • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                    • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                    • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                    • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                    • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                  • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                  • API String ID: 1074704982-2844324180
                                  • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                  • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                  • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                  • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                  APIs
                                  • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                  • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                  • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                  • strlen.MSVCRT(?), ref: 004011A7
                                  • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                  • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                  • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                  • String ID: 0@$Software\$WanaCrypt0r
                                  • API String ID: 865909632-3421300005
                                  • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                  • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                  • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                  • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                  • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                  • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                  • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                  • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                    • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                    • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                  • String ID: %s\Intel$%s\ProgramData
                                  • API String ID: 3806094219-198707228
                                  • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                  • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                  • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                  • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                  APIs
                                    • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                  • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                  • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                  • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                    • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                  • SetLastError.KERNEL32(0000045A), ref: 00402430
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                  • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                  • API String ID: 1900561814-3657104962
                                  • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                  • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                  • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                  • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                  APIs
                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                  • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                  • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                  • String ID: %s\%s
                                  • API String ID: 1036847564-4073750446
                                  • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                  • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                  • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                  • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                  • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                  • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                  • CloseHandle.KERNEL32(?), ref: 004010EC
                                  • CloseHandle.KERNEL32(?), ref: 004010F1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                  • String ID: D
                                  • API String ID: 786732093-2746444292
                                  • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                  • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                  • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                  • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                  APIs
                                  • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                  • __p__fmode.MSVCRT ref: 004077FC
                                  • __p__commode.MSVCRT ref: 0040780A
                                  • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                  • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                  • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                  • String ID:
                                  • API String ID: 3626615345-0
                                  • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                  • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                  • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                  • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                  APIs
                                  • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                    • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                  • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                  • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                  • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                  • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                  • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                  • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                  • String ID:
                                  • API String ID: 2141228402-0
                                  • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                  • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                  • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                  • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                  APIs
                                  • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                  • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                  • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Read$realloc
                                  • String ID: ?!@
                                  • API String ID: 1241503663-708128716
                                  • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                  • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                  • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                  • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: rand$wcslen$ComputerNamesrand
                                  • String ID:
                                  • API String ID: 3058258771-0
                                  • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                  • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                  • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                  • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                  APIs
                                  • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                  • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                  • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                  • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                  • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                  • String ID:
                                  • API String ID: 2935503933-0
                                  • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                  • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                  • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                  • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                  APIs
                                  • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                  • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                  • Sleep.KERNEL32(000003E8), ref: 00401F40
                                  • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandleMutexOpenSleepsprintf
                                  • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                  • API String ID: 2780352083-2959021817
                                  • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                  • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                  • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                  • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                  APIs
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                  • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                  • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??0exception@@ExceptionThrowmemcpy
                                  • String ID:
                                  • API String ID: 2382887404-0
                                  • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                  • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                  • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                  • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                  APIs
                                  • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                  • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                  • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                  • fclose.MSVCRT(00000000), ref: 00401058
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: fclosefopenfreadfwrite
                                  • String ID: c.wnry
                                  • API String ID: 4000964834-3240288721
                                  • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                  • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                  • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                  • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                  APIs
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                  • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                  • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                  • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                  • String ID:
                                  • API String ID: 2811923685-0
                                  • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                  • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                  • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                  • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                  • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Pointer$??2@Create
                                  • String ID:
                                  • API String ID: 1331958074-0
                                  • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                  • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                  • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                  • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                  APIs
                                  • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                  • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_stricmp
                                  • String ID: P!@
                                  • API String ID: 1278613211-1774101457
                                  • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                  • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                  • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                  • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                  APIs
                                  • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                  • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AttributesFilestrcmp
                                  • String ID: c.wnry
                                  • API String ID: 3324900478-3240288721
                                  • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                  • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                  • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                  • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                  APIs
                                  • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                  • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??3@CloseHandle
                                  • String ID: $l@
                                  • API String ID: 3816424416-2140230165
                                  • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                  • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                  • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                  • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                  • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                  • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2167450240.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000009.00000002.2167432762.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167466949.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167483875.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000710000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000716000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000719000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000071F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000731000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000734000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.000000000073D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2167500585.0000000000746000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$Leave$Entermemcpy
                                  • String ID:
                                  • API String ID: 3435569088-0
                                  • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                  • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                  • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                  • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65