Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bopY0ot9wf.dll

Overview

General Information

Sample name:bopY0ot9wf.dll
renamed because original name is a hash value
Original sample name:f3178ae77df457f34b2b3a5e9f50bd9e.dll
Analysis ID:1591380
MD5:f3178ae77df457f34b2b3a5e9f50bd9e
SHA1:af036d1febda4cb07ae8efe3961decaab50bea45
SHA256:e033904d3cd18d9934335e78694a9c48f8cca7f1447479fe40f5e6ac8d55af25
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Wannacry Ransomware
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6836 cmdline: loaddll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5608 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 1068 cmdline: rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 2744 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 3309B9838FA3B66A046FCA2740D4EE25)
          • tasksche.exe (PID: 2976 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 68B3F7C2334E7FCB13795D39AA2D5F3E)
    • rundll32.exe (PID: 6380 cmdline: rundll32.exe C:\Users\user\Desktop\bopY0ot9wf.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4464 cmdline: rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 5812 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 3309B9838FA3B66A046FCA2740D4EE25)
        • tasksche.exe (PID: 5876 cmdline: C:\WINDOWS\tasksche.exe /i MD5: 68B3F7C2334E7FCB13795D39AA2D5F3E)
  • mssecsvc.exe (PID: 1160 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 3309B9838FA3B66A046FCA2740D4EE25)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
bopY0ot9wf.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    bopY0ot9wf.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    bopY0ot9wf.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
      • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
      • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\tasksche.exeWin32_Ransomware_WannaCryunknownReversingLabs
      • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
      • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
      SourceRuleDescriptionAuthorStrings
      00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      0000000C.00000002.1516646003.000000000040E000.00000008.00000001.01000000.00000007.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0x14d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0x1500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      0000000B.00000000.1506902921.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            8.2.mssecsvc.exe.1eae084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            8.2.mssecsvc.exe.23ce8c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
            • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
            • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
            8.2.mssecsvc.exe.1ee0128.3.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              8.2.mssecsvc.exe.1ee0128.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xf4d8:$x3: tasksche.exe
              • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xf52c:$x5: WNcry@2ol7
              • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xf42c:$s3: cmd.exe /c "%s"
              • 0x41980:$s4: msg/m_portuguese.wnry
              • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
              • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
              • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
              8.2.mssecsvc.exe.1ee0128.3.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              Click to see the 135 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:01:25.345839+010020315153Misc activity104.16.167.22880192.168.2.849705TCP
              2025-01-14T23:01:26.534443+010020315153Misc activity104.16.167.22880192.168.2.849706TCP
              2025-01-14T23:01:27.963277+010020315153Misc activity104.16.167.22880192.168.2.849723TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:01:24.793008+010020242911A Network Trojan was detected192.168.2.8574071.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:01:25.343818+010020242981A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
              2025-01-14T23:01:26.533484+010020242981A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-14T23:01:27.956208+010020242981A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:01:25.343818+010020242991A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
              2025-01-14T23:01:26.533484+010020242991A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-14T23:01:27.956208+010020242991A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:01:25.343818+010020243011A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
              2025-01-14T23:01:26.533484+010020243011A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-14T23:01:27.956208+010020243011A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:01:25.343818+010020243021A Network Trojan was detected192.168.2.849705104.16.167.22880TCP
              2025-01-14T23:01:26.533484+010020243021A Network Trojan was detected192.168.2.849706104.16.167.22880TCP
              2025-01-14T23:01:27.956208+010020243021A Network Trojan was detected192.168.2.849723104.16.167.22880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T23:01:25.343818+010028033043Unknown Traffic192.168.2.849705104.16.167.22880TCP
              2025-01-14T23:01:26.533484+010028033043Unknown Traffic192.168.2.849706104.16.167.22880TCP
              2025-01-14T23:01:27.956208+010028033043Unknown Traffic192.168.2.849723104.16.167.22880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: bopY0ot9wf.dllAvira: detected
              Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Ransom.Gen
              Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 100%
              Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
              Source: bopY0ot9wf.dllReversingLabs: Detection: 88%
              Source: bopY0ot9wf.dllVirustotal: Detection: 93%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
              Source: bopY0ot9wf.dllJoe Sandbox ML: detected
              Source: C:\Windows\tasksche.exeCode function: 9_2_004018B9 CryptReleaseContext,9_2_004018B9

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
              Source: bopY0ot9wf.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.8:49723 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.8:49723 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.8:49723 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49723 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 22:01:25 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020e78cfe540f84-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 22:01:26 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020e7947bf043a7-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 22:01:27 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020e79d4b380f80-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.8:57407 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49706 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49705 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49705
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49723 -> 104.16.167.228:80
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49723
              Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.8:49706
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.10
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.10
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.10
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.10
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.130
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.130
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.130
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.130
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.1
              Source: unknownTCP traffic detected without corresponding DNS query: 20.51.106.1
              Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.36
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.36
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.36
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.1
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.36
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.1
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.1
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.1
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.1
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.1
              Source: unknownTCP traffic detected without corresponding DNS query: 147.209.87.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 194.143.231.1
              Source: unknownTCP traffic detected without corresponding DNS query: 157.200.46.44
              Source: unknownTCP traffic detected without corresponding DNS query: 157.200.46.44
              Source: unknownTCP traffic detected without corresponding DNS query: 157.200.46.44
              Source: unknownTCP traffic detected without corresponding DNS query: 157.200.46.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: bopY0ot9wf.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              Source: mssecsvc.exe, 0000000B.00000002.1518360717.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
              Source: mssecsvc.exe, 0000000B.00000002.1518360717.0000000000D68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
              Source: mssecsvc.exe, 00000008.00000002.2136844932.0000000000BCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/J
              Source: mssecsvc.exe, 00000008.00000002.2136844932.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Q
              Source: mssecsvc.exe, 00000008.00000002.2136844932.0000000000BCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s:
              Source: mssecsvc.exe, 0000000B.00000002.1518360717.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/t
              Source: mssecsvc.exe, 00000008.00000002.2136172889.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ
              Source: mssecsvc.exe, 00000008.00000002.2136844932.0000000000BCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comgsJ
              Source: mssecsvc.exe, 0000000B.00000002.1518360717.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\tasksche.exeCode function: CreateFileA,GetFileSizeEx,memcmp,GlobalAlloc,_local_unwind2, WANACRY!9_2_004014A6
              Source: Yara matchFile source: bopY0ot9wf.dll, type: SAMPLE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23dd948.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23ce8c8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23d98e8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.23dd948.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000B.00000000.1506902921.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1517382462.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1489002654.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1478097199.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000000.1507061916.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2137398178.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1517664610.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1477966670.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.1489155785.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2137726500.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 2744, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 1160, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 5812, type: MEMORYSTR
              Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

              System Summary

              barindex
              Source: bopY0ot9wf.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: bopY0ot9wf.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1eae084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23ce8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23dd948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23dd948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.23dd948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23ce8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23ce8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: 8.2.mssecsvc.exe.23d98e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23d98e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.23dd948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.23dd948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000002.1516646003.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000C.00000000.1516013290.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000009.00000000.1502350538.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000006.00000000.1478097199.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000000.1507061916.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2137398178.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 0000000B.00000002.1517664610.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000000.1489155785.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: 00000008.00000002.2137726500.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\tasksche.exeCode function: 9_2_00406C409_2_00406C40
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402A769_2_00402A76
              Source: C:\Windows\tasksche.exeCode function: 9_2_00402E7E9_2_00402E7E
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040350F9_2_0040350F
              Source: C:\Windows\tasksche.exeCode function: 9_2_00404C199_2_00404C19
              Source: C:\Windows\tasksche.exeCode function: 9_2_0040541F9_2_0040541F
              Source: C:\Windows\tasksche.exeCode function: 9_2_004037979_2_00403797
              Source: C:\Windows\tasksche.exeCode function: 9_2_004043B79_2_004043B7
              Source: C:\Windows\tasksche.exeCode function: 9_2_004031BC9_2_004031BC
              Source: tasksche.exe.6.drStatic PE information: Resource name: XIA type: Zip archive data, at least v2.0 to extract, compression method=deflate
              Source: bopY0ot9wf.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
              Source: bopY0ot9wf.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: bopY0ot9wf.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1eae084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23ce8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1ee0128.3.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.240096c.7.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1ebd104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23dd948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23dd948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.23dd948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.240096c.7.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1ee0128.3.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 9.2.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23ce8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23ce8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1eae084.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 12.0.tasksche.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 11.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1eb90a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.mssecsvc.exe.23d98e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23d98e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.23dd948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.23dd948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: 8.2.mssecsvc.exe.1ebd104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000002.1516646003.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000C.00000000.1516013290.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000009.00000000.1502350538.000000000040E000.00000008.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000006.00000000.1478097199.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000000.1507061916.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2137398178.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 0000000B.00000002.1517664610.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000000.1489155785.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: 00000008.00000002.2137726500.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
              Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: tasksche.exe, 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000002.1516646003.000000000040E000.00000008.00000001.01000000.00000007.sdmp, bopY0ot9wf.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
              Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/2@1/100
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
              Source: C:\Windows\tasksche.exeCode function: OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,sprintf,CreateServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,9_2_00401CE8
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
              Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1452:120:WilError_03
              Source: bopY0ot9wf.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\bopY0ot9wf.dll,PlayGame
              Source: bopY0ot9wf.dllReversingLabs: Detection: 88%
              Source: bopY0ot9wf.dllVirustotal: Detection: 93%
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\bopY0ot9wf.dll,PlayGame
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",PlayGame
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\bopY0ot9wf.dll,PlayGameJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",PlayGameJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: bopY0ot9wf.dllStatic file information: File size 5267459 > 1048576
              Source: bopY0ot9wf.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_00407710 push eax; ret 9_2_0040773E
              Source: C:\Windows\tasksche.exeCode function: 9_2_004076C8 push eax; ret 9_2_004076E6

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
              Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
              Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3284Thread sleep count: 96 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3284Thread sleep time: -192000s >= -30000sJump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3280Thread sleep count: 129 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3280Thread sleep count: 42 > 30Jump to behavior
              Source: C:\Windows\mssecsvc.exe TID: 3284Thread sleep time: -86400000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
              Source: mssecsvc.exe, 00000006.00000002.1503904434.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2136844932.0000000000BF9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1518360717.0000000000D68000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000B.00000002.1518360717.0000000000DBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mssecsvc.exe, 00000006.00000002.1503904434.0000000000C97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(Z
              Source: mssecsvc.exe, 00000008.00000002.2136844932.0000000000BCC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0<
              Source: C:\Windows\tasksche.exeCode function: 9_2_00401A45 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_00401A45
              Source: C:\Windows\tasksche.exeCode function: 9_2_004029CC free,GetProcessHeap,HeapFree,9_2_004029CC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1Jump to behavior
              Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Service Execution
              4
              Windows Service
              4
              Windows Service
              12
              Masquerading
              OS Credential Dumping1
              Network Share Discovery
              Remote Services1
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              21
              Virtualization/Sandbox Evasion
              LSASS Memory111
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media11
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS2
              System Information Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591380 Sample: bopY0ot9wf.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 43 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->43 53 Tries to download HTTP data from a sinkholed server 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 10 loaddll32.exe 1 2->10         started        12 mssecsvc.exe 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        45 192.168.2.100 unknown unknown 12->45 47 192.168.2.102 unknown unknown 12->47 49 98 other IPs or domains 12->49 71 Connects to many different private IPs via SMB (likely to spread or exploit) 12->71 73 Connects to many different private IPs (likely to spread or exploit) 12->73 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        51 Drops executables to the windows directory (C:\Windows) and starts them 18->51 27 mssecsvc.exe 7 18->27         started        process9 file10 31 mssecsvc.exe 7 25->31         started        39 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->39 dropped 69 Drops executables to the windows directory (C:\Windows) and starts them 27->69 34 tasksche.exe 27->34         started        signatures11 process12 file13 41 C:\Windows\tasksche.exe, PE32 31->41 dropped 36 tasksche.exe 31->36         started        process14 signatures15 61 Detected Wannacry Ransomware 36->61 63 Antivirus detection for dropped file 36->63 65 Multi AV Scanner detection for dropped file 36->65 67 Machine Learning detection for dropped file 36->67

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              bopY0ot9wf.dll88%ReversingLabsWin32.Ransomware.WannaCry
              bopY0ot9wf.dll93%VirustotalBrowse
              bopY0ot9wf.dll100%AviraTR/Ransom.Gen
              bopY0ot9wf.dll100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\tasksche.exe100%AviraTR/Ransom.Gen
              C:\Windows\tasksche.exe100%Joe Sandbox ML
              C:\WINDOWS\qeriuwjhrf (copy)100%ReversingLabsWin32.Ransomware.WannaCry
              C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://www.kryptoslogic.com0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJ0%Avira URL Cloudsafe
              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comgsJ0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
              104.16.167.228
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.combopY0ot9wf.dllfalse
                    high
                    https://www.kryptoslogic.commssecsvc.exe, 0000000B.00000002.1518360717.0000000000DCA000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Qmssecsvc.exe, 00000008.00000002.2136844932.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comgsJmssecsvc.exe, 00000008.00000002.2136844932.0000000000BCC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvc.exe, 0000000B.00000002.1518360717.0000000000D68000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Jmssecsvc.exe, 00000008.00000002.2136844932.0000000000BCC000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/s:mssecsvc.exe, 00000008.00000002.2136844932.0000000000BCC000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/tmssecsvc.exe, 0000000B.00000002.1518360717.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comJmssecsvc.exe, 00000008.00000002.2136172889.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              188.147.52.2
                              unknownPoland
                              12912TMPLfalse
                              188.147.52.4
                              unknownPoland
                              12912TMPLfalse
                              188.147.52.1
                              unknownPoland
                              12912TMPLfalse
                              64.73.149.115
                              unknownUnited States
                              3599BINCNETUSfalse
                              80.198.199.2
                              unknownDenmark
                              3292TDCTDCASDKfalse
                              80.198.199.1
                              unknownDenmark
                              3292TDCTDCASDKfalse
                              86.93.55.1
                              unknownNetherlands
                              1136KPNKPNNationalEUfalse
                              107.176.182.14
                              unknownUnited States
                              40676AS40676USfalse
                              61.143.77.1
                              unknownChina
                              4813BACKBONE-GUANGDONG-APChinaTelecomGroupCNfalse
                              181.179.19.120
                              unknownPanama
                              262227ClaroPanamaSAPAfalse
                              185.163.186.24
                              unknownDenmark
                              206157COMPLEADKfalse
                              168.195.221.143
                              unknownBrazil
                              263421NRTelecomEIRELI-MEBRfalse
                              20.51.106.2
                              unknownUnited States
                              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                              20.51.106.1
                              unknownUnited States
                              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                              73.163.6.192
                              unknownUnited States
                              7922COMCAST-7922USfalse
                              181.179.19.1
                              unknownPanama
                              262227ClaroPanamaSAPAfalse
                              185.163.186.1
                              unknownDenmark
                              206157COMPLEADKfalse
                              198.1.189.185
                              unknownUnited States
                              11282SERVERYOUUSfalse
                              128.83.164.44
                              unknownUnited States
                              18UTEXASUSfalse
                              IP
                              192.168.2.148
                              192.168.2.149
                              192.168.2.146
                              192.168.2.147
                              192.168.2.140
                              192.168.2.141
                              192.168.2.144
                              192.168.2.145
                              192.168.2.142
                              192.168.2.143
                              192.168.2.159
                              192.168.2.157
                              192.168.2.158
                              192.168.2.151
                              192.168.2.152
                              192.168.2.150
                              192.168.2.155
                              192.168.2.156
                              192.168.2.153
                              192.168.2.154
                              192.168.2.126
                              192.168.2.247
                              192.168.2.127
                              192.168.2.248
                              192.168.2.124
                              192.168.2.245
                              192.168.2.125
                              192.168.2.246
                              192.168.2.128
                              192.168.2.249
                              192.168.2.129
                              192.168.2.240
                              192.168.2.122
                              192.168.2.243
                              192.168.2.123
                              192.168.2.244
                              192.168.2.120
                              192.168.2.241
                              192.168.2.121
                              192.168.2.242
                              192.168.2.97
                              192.168.2.137
                              192.168.2.96
                              192.168.2.138
                              192.168.2.99
                              192.168.2.135
                              192.168.2.98
                              192.168.2.136
                              192.168.2.139
                              192.168.2.250
                              192.168.2.130
                              192.168.2.251
                              192.168.2.91
                              192.168.2.90
                              192.168.2.93
                              192.168.2.133
                              192.168.2.254
                              192.168.2.92
                              192.168.2.134
                              192.168.2.95
                              192.168.2.131
                              192.168.2.252
                              192.168.2.94
                              192.168.2.132
                              192.168.2.253
                              192.168.2.104
                              192.168.2.225
                              192.168.2.105
                              192.168.2.226
                              192.168.2.102
                              192.168.2.223
                              192.168.2.103
                              192.168.2.224
                              192.168.2.108
                              192.168.2.229
                              192.168.2.109
                              192.168.2.106
                              192.168.2.227
                              192.168.2.107
                              192.168.2.228
                              192.168.2.100
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1591380
                              Start date and time:2025-01-14 23:00:18 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 4m 54s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:16
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:bopY0ot9wf.dll
                              renamed because original name is a hash value
                              Original Sample Name:f3178ae77df457f34b2b3a5e9f50bd9e.dll
                              Detection:MAL
                              Classification:mal100.rans.expl.evad.winDLL@20/2@1/100
                              EGA Information:
                              • Successful, ratio: 66.7%
                              HCA Information:Failed
                              Cookbook Comments:
                              • Found application associated with file extension: .dll
                              • Stop behavior analysis, all processes terminated
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 199.232.210.172, 2.17.190.73, 52.149.20.212, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target tasksche.exe, PID 2976 because there are no executed function
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              17:01:26API Interceptor1x Sleep call for process: loaddll32.exe modified
                              17:02:00API Interceptor112x Sleep call for process: mssecsvc.exe modified
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comhzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              sEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              87c6RORO31.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                              • 104.16.166.228
                              k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                              • 104.16.167.228
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TMPL1.elfGet hashmaliciousUnknownBrowse
                              • 46.205.31.7
                              db0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
                              • 178.180.117.219
                              nabmpsl.elfGet hashmaliciousUnknownBrowse
                              • 178.182.214.119
                              nshkarm.elfGet hashmaliciousMiraiBrowse
                              • 46.204.48.239
                              la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                              • 46.204.125.222
                              TRC.mips.elfGet hashmaliciousMiraiBrowse
                              • 37.30.62.68
                              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                              • 178.180.37.114
                              akcqrfutuo.elfGet hashmaliciousUnknownBrowse
                              • 178.181.204.133
                              home.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 37.30.44.250
                              x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 46.205.168.229
                              TMPL1.elfGet hashmaliciousUnknownBrowse
                              • 46.205.31.7
                              db0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
                              • 178.180.117.219
                              nabmpsl.elfGet hashmaliciousUnknownBrowse
                              • 178.182.214.119
                              nshkarm.elfGet hashmaliciousMiraiBrowse
                              • 46.204.48.239
                              la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                              • 46.204.125.222
                              TRC.mips.elfGet hashmaliciousMiraiBrowse
                              • 37.30.62.68
                              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                              • 178.180.37.114
                              akcqrfutuo.elfGet hashmaliciousUnknownBrowse
                              • 178.181.204.133
                              home.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 37.30.44.250
                              x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 46.205.168.229
                              TMPL1.elfGet hashmaliciousUnknownBrowse
                              • 46.205.31.7
                              db0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
                              • 178.180.117.219
                              nabmpsl.elfGet hashmaliciousUnknownBrowse
                              • 178.182.214.119
                              nshkarm.elfGet hashmaliciousMiraiBrowse
                              • 46.204.48.239
                              la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                              • 46.204.125.222
                              TRC.mips.elfGet hashmaliciousMiraiBrowse
                              • 37.30.62.68
                              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                              • 178.180.37.114
                              akcqrfutuo.elfGet hashmaliciousUnknownBrowse
                              • 178.181.204.133
                              home.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
                              • 37.30.44.250
                              x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 46.205.168.229
                              No context
                              No context
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):3.929854272088689
                              Encrypted:false
                              SSDEEP:24576:nQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdPF58E9Ls:nQqMSPbcBVQej/1I/8E9Ls
                              MD5:68B3F7C2334E7FCB13795D39AA2D5F3E
                              SHA1:47E5F3C7028362C18CC27415C19C166BD001144A
                              SHA-256:969BF6584D54F32E06A4819C482207D01E16172026FB6A16711BA9728A05D564
                              SHA-512:F80409415AAAF9E87A51A7BACA0374E4C85779FCAF85205997069E35EC39F0AA1760DF42468CCC493D238902E4E5B3683EE03CB6C60697C8094801C9F1D1A797
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\mssecsvc.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):3514368
                              Entropy (8bit):3.929854272088689
                              Encrypted:false
                              SSDEEP:24576:nQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdPF58E9Ls:nQqMSPbcBVQej/1I/8E9Ls
                              MD5:68B3F7C2334E7FCB13795D39AA2D5F3E
                              SHA1:47E5F3C7028362C18CC27415C19C166BD001144A
                              SHA-256:969BF6584D54F32E06A4819C482207D01E16172026FB6A16711BA9728A05D564
                              SHA-512:F80409415AAAF9E87A51A7BACA0374E4C85779FCAF85205997069E35EC39F0AA1760DF42468CCC493D238902E4E5B3683EE03CB6C60697C8094801C9F1D1A797
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:..T...T...T..X...T.._...T.'.Z...T..^...T..P...T.g.....T...U...T..._...T.c.R...T.Rich..T.........................PE..L...A..L.................p... 5......w............@...........................5.................................................d.........4..........................................................................................................text....i.......p.................. ..`.rdata..p_.......`..................@..@.data...X........ ..................@....rsrc.....4.......4.................@..@........................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):3.0802802534271736
                              TrID:
                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                              • Generic Win/DOS Executable (2004/3) 0.20%
                              • DOS Executable Generic (2002/1) 0.20%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:bopY0ot9wf.dll
                              File size:5'267'459 bytes
                              MD5:f3178ae77df457f34b2b3a5e9f50bd9e
                              SHA1:af036d1febda4cb07ae8efe3961decaab50bea45
                              SHA256:e033904d3cd18d9934335e78694a9c48f8cca7f1447479fe40f5e6ac8d55af25
                              SHA512:133cbd4de24792b231b459f7b0e63bd55bed662c1ecc3a553a7b23858fa201197c40c6adf6a38bda8673dfebf066100e086b9a27d1f9be309cf742dd3a95effa
                              SSDEEP:24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdPF58E9L:SnAQqMSPbcBVQej/1I/8E9L
                              TLSH:1136BF43C20610BDD02D873191EB0FA0DA775EB5766D714A5F22B6192EB33C2BEA5E43
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                              Icon Hash:7ae282899bbab082
                              Entrypoint:0x100011e9
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x10000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                              DLL Characteristics:
                              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                              Instruction
                              push ebp
                              mov ebp, esp
                              push ebx
                              mov ebx, dword ptr [ebp+08h]
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              push edi
                              mov edi, dword ptr [ebp+10h]
                              test esi, esi
                              jne 00007F884CFB7CFBh
                              cmp dword ptr [10003140h], 00000000h
                              jmp 00007F884CFB7D18h
                              cmp esi, 01h
                              je 00007F884CFB7CF7h
                              cmp esi, 02h
                              jne 00007F884CFB7D14h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F884CFB7CFBh
                              push edi
                              push esi
                              push ebx
                              call eax
                              test eax, eax
                              je 00007F884CFB7CFEh
                              push edi
                              push esi
                              push ebx
                              call 00007F884CFB7C0Ah
                              test eax, eax
                              jne 00007F884CFB7CF6h
                              xor eax, eax
                              jmp 00007F884CFB7D40h
                              push edi
                              push esi
                              push ebx
                              call 00007F884CFB7ABCh
                              cmp esi, 01h
                              mov dword ptr [ebp+0Ch], eax
                              jne 00007F884CFB7CFEh
                              test eax, eax
                              jne 00007F884CFB7D29h
                              push edi
                              push eax
                              push ebx
                              call 00007F884CFB7BE6h
                              test esi, esi
                              je 00007F884CFB7CF7h
                              cmp esi, 03h
                              jne 00007F884CFB7D18h
                              push edi
                              push esi
                              push ebx
                              call 00007F884CFB7BD5h
                              test eax, eax
                              jne 00007F884CFB7CF5h
                              and dword ptr [ebp+0Ch], eax
                              cmp dword ptr [ebp+0Ch], 00000000h
                              je 00007F884CFB7D03h
                              mov eax, dword ptr [10003150h]
                              test eax, eax
                              je 00007F884CFB7CFAh
                              push edi
                              push esi
                              push ebx
                              call eax
                              mov dword ptr [ebp+0Ch], eax
                              mov eax, dword ptr [ebp+0Ch]
                              pop edi
                              pop esi
                              pop ebx
                              pop ebp
                              retn 000Ch
                              jmp dword ptr [10002028h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              Programming Language:
                              • [ C ] VS98 (6.0) build 8168
                              • [C++] VS98 (6.0) build 8168
                              • [RES] VS98 (6.0) cvtres build 1720
                              • [LNK] VS98 (6.0) imp/exp build 8168
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x40000x5000600x501000598d82a120049114a31e5278da33175funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              W0x40600x500000dataEnglishUnited States0.8770942687988281
                              DLLImport
                              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                              NameOrdinalAddress
                              PlayGame10x10001114
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-14T23:01:24.793008+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.8574071.1.1.153UDP
                              2025-01-14T23:01:25.343818+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849705104.16.167.22880TCP
                              2025-01-14T23:01:25.343818+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849705104.16.167.22880TCP
                              2025-01-14T23:01:25.343818+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849705104.16.167.22880TCP
                              2025-01-14T23:01:25.343818+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849705104.16.167.22880TCP
                              2025-01-14T23:01:25.343818+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849705104.16.167.22880TCP
                              2025-01-14T23:01:25.345839+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849705TCP
                              2025-01-14T23:01:26.533484+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849706104.16.167.22880TCP
                              2025-01-14T23:01:26.533484+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849706104.16.167.22880TCP
                              2025-01-14T23:01:26.533484+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849706104.16.167.22880TCP
                              2025-01-14T23:01:26.533484+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849706104.16.167.22880TCP
                              2025-01-14T23:01:26.533484+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849706104.16.167.22880TCP
                              2025-01-14T23:01:26.534443+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849706TCP
                              2025-01-14T23:01:27.956208+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849723104.16.167.22880TCP
                              2025-01-14T23:01:27.956208+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.849723104.16.167.22880TCP
                              2025-01-14T23:01:27.956208+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.849723104.16.167.22880TCP
                              2025-01-14T23:01:27.956208+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.849723104.16.167.22880TCP
                              2025-01-14T23:01:27.956208+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.849723104.16.167.22880TCP
                              2025-01-14T23:01:27.963277+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.849723TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 23:01:17.967677116 CET49673443192.168.2.823.206.229.226
                              Jan 14, 2025 23:01:18.389483929 CET49672443192.168.2.823.206.229.226
                              Jan 14, 2025 23:01:22.077083111 CET49676443192.168.2.852.182.143.211
                              Jan 14, 2025 23:01:24.592763901 CET4967780192.168.2.8192.229.211.108
                              Jan 14, 2025 23:01:24.831681013 CET4970580192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:24.836553097 CET8049705104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:24.836641073 CET4970580192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:24.836764097 CET4970580192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:24.841547012 CET8049705104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:25.343739986 CET8049705104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:25.343817949 CET4970580192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:25.343954086 CET4970580192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:25.345839024 CET8049705104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:25.345902920 CET4970580192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:25.348751068 CET8049705104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:26.040118933 CET4970680192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:26.045064926 CET8049706104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:26.045169115 CET4970680192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:26.045376062 CET4970680192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:26.050179958 CET8049706104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:26.533389091 CET8049706104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:26.533483982 CET4970680192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:26.534442902 CET8049706104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:26.534517050 CET4970680192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:26.534581900 CET4970680192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:26.543452024 CET8049706104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:26.664200068 CET49707445192.168.2.8194.143.231.10
                              Jan 14, 2025 23:01:26.669157028 CET44549707194.143.231.10192.168.2.8
                              Jan 14, 2025 23:01:26.669240952 CET49707445192.168.2.8194.143.231.10
                              Jan 14, 2025 23:01:26.670232058 CET49707445192.168.2.8194.143.231.10
                              Jan 14, 2025 23:01:26.670512915 CET49708445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:26.675043106 CET44549707194.143.231.10192.168.2.8
                              Jan 14, 2025 23:01:26.675112009 CET49707445192.168.2.8194.143.231.10
                              Jan 14, 2025 23:01:26.675247908 CET44549708194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:26.675308943 CET49708445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:26.675360918 CET49708445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:26.680284977 CET44549708194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:26.680342913 CET49708445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:26.694673061 CET49710445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:26.699785948 CET44549710194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:26.699841976 CET49710445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:26.699917078 CET49710445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:26.704695940 CET44549710194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:27.459016085 CET4972380192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:27.463830948 CET8049723104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:27.463928938 CET4972380192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:27.464159966 CET4972380192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:27.468888044 CET8049723104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:27.577214003 CET49673443192.168.2.823.206.229.226
                              Jan 14, 2025 23:01:27.955717087 CET8049723104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:27.956012011 CET8049723104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:27.956207991 CET4972380192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:27.958497047 CET4972380192.168.2.8104.16.167.228
                              Jan 14, 2025 23:01:27.963277102 CET8049723104.16.167.228192.168.2.8
                              Jan 14, 2025 23:01:27.999110937 CET49672443192.168.2.823.206.229.226
                              Jan 14, 2025 23:01:28.415039062 CET44549710194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:28.415170908 CET49710445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:28.445440054 CET49710445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:28.445440054 CET49710445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:28.450342894 CET44549710194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:28.450380087 CET44549710194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:28.679178953 CET49733445192.168.2.820.51.106.130
                              Jan 14, 2025 23:01:28.684041023 CET4454973320.51.106.130192.168.2.8
                              Jan 14, 2025 23:01:28.684142113 CET49733445192.168.2.820.51.106.130
                              Jan 14, 2025 23:01:28.684403896 CET49733445192.168.2.820.51.106.130
                              Jan 14, 2025 23:01:28.684664965 CET49734445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:28.689378023 CET4454973320.51.106.130192.168.2.8
                              Jan 14, 2025 23:01:28.689419031 CET4454973420.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:28.689439058 CET49733445192.168.2.820.51.106.130
                              Jan 14, 2025 23:01:28.689497948 CET49734445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:28.690853119 CET49734445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:28.695636034 CET4454973420.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:28.695699930 CET49734445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:28.702950001 CET49735445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:28.707847118 CET4454973520.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:28.707942009 CET49735445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:28.708803892 CET49735445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:28.713606119 CET4454973520.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:29.654274940 CET4434970423.206.229.226192.168.2.8
                              Jan 14, 2025 23:01:29.654508114 CET49704443192.168.2.823.206.229.226
                              Jan 14, 2025 23:01:30.688376904 CET49758445192.168.2.8147.209.87.36
                              Jan 14, 2025 23:01:30.693212986 CET44549758147.209.87.36192.168.2.8
                              Jan 14, 2025 23:01:30.693325996 CET49758445192.168.2.8147.209.87.36
                              Jan 14, 2025 23:01:30.698323965 CET49758445192.168.2.8147.209.87.36
                              Jan 14, 2025 23:01:30.698666096 CET49759445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:30.703129053 CET44549758147.209.87.36192.168.2.8
                              Jan 14, 2025 23:01:30.703193903 CET49758445192.168.2.8147.209.87.36
                              Jan 14, 2025 23:01:30.703432083 CET44549759147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:30.703494072 CET49759445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:30.703553915 CET49759445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:30.704649925 CET49760445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:30.708503962 CET44549759147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:30.708559990 CET49759445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:30.709460020 CET44549760147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:30.709528923 CET49760445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:30.709600925 CET49760445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:30.714389086 CET44549760147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:31.452622890 CET49768445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:31.457488060 CET44549768194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:31.457567930 CET49768445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:31.457614899 CET49768445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:31.462357998 CET44549768194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:32.704090118 CET49782445192.168.2.8157.200.46.44
                              Jan 14, 2025 23:01:32.708864927 CET44549782157.200.46.44192.168.2.8
                              Jan 14, 2025 23:01:32.708992958 CET49782445192.168.2.8157.200.46.44
                              Jan 14, 2025 23:01:32.708993912 CET49782445192.168.2.8157.200.46.44
                              Jan 14, 2025 23:01:32.709147930 CET49784445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:32.713881969 CET44549784157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:32.713929892 CET44549782157.200.46.44192.168.2.8
                              Jan 14, 2025 23:01:32.713946104 CET49784445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:32.713988066 CET49782445192.168.2.8157.200.46.44
                              Jan 14, 2025 23:01:32.714030981 CET49784445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:32.715045929 CET49785445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:32.719286919 CET44549784157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:32.719352961 CET49784445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:32.719820023 CET44549785157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:32.719890118 CET49785445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:32.719923973 CET49785445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:32.724682093 CET44549785157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:33.128405094 CET44549768194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:33.128530979 CET49768445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:33.128582001 CET49768445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:33.128673077 CET49768445192.168.2.8194.143.231.1
                              Jan 14, 2025 23:01:33.133347988 CET44549768194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:33.133425951 CET44549768194.143.231.1192.168.2.8
                              Jan 14, 2025 23:01:33.189332008 CET49790445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:33.194235086 CET44549790194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:33.194315910 CET49790445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:33.194351912 CET49790445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:33.197051048 CET49791445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:33.199820995 CET44549790194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:33.199887991 CET49790445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:33.201833963 CET44549791194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:33.201910973 CET49791445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:33.201992035 CET49791445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:33.206686020 CET44549791194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:34.719377995 CET49809445192.168.2.8188.147.52.4
                              Jan 14, 2025 23:01:34.724184036 CET44549809188.147.52.4192.168.2.8
                              Jan 14, 2025 23:01:34.724297047 CET49809445192.168.2.8188.147.52.4
                              Jan 14, 2025 23:01:34.724356890 CET49809445192.168.2.8188.147.52.4
                              Jan 14, 2025 23:01:34.724550962 CET49810445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:34.729237080 CET44549809188.147.52.4192.168.2.8
                              Jan 14, 2025 23:01:34.729312897 CET44549810188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:34.729407072 CET49810445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:34.729407072 CET49810445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:34.730180025 CET44549809188.147.52.4192.168.2.8
                              Jan 14, 2025 23:01:34.730245113 CET49811445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:34.730245113 CET49809445192.168.2.8188.147.52.4
                              Jan 14, 2025 23:01:34.734328985 CET44549810188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:34.734394073 CET49810445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:34.735049963 CET44549811188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:34.735121965 CET49811445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:34.735152006 CET49811445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:34.739932060 CET44549811188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:36.734896898 CET49832445192.168.2.8210.196.38.121
                              Jan 14, 2025 23:01:36.739809990 CET44549832210.196.38.121192.168.2.8
                              Jan 14, 2025 23:01:36.739907980 CET49832445192.168.2.8210.196.38.121
                              Jan 14, 2025 23:01:36.739953995 CET49832445192.168.2.8210.196.38.121
                              Jan 14, 2025 23:01:36.740147114 CET49833445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:36.745033026 CET44549833210.196.38.1192.168.2.8
                              Jan 14, 2025 23:01:36.745048046 CET44549832210.196.38.121192.168.2.8
                              Jan 14, 2025 23:01:36.745093107 CET49833445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:36.745122910 CET49832445192.168.2.8210.196.38.121
                              Jan 14, 2025 23:01:36.745178938 CET49833445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:36.746233940 CET49834445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:36.750040054 CET44549833210.196.38.1192.168.2.8
                              Jan 14, 2025 23:01:36.750097990 CET49833445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:36.751014948 CET44549834210.196.38.1192.168.2.8
                              Jan 14, 2025 23:01:36.751090050 CET49834445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:36.751130104 CET49834445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:36.755856037 CET44549834210.196.38.1192.168.2.8
                              Jan 14, 2025 23:01:38.750284910 CET49858445192.168.2.8124.112.153.22
                              Jan 14, 2025 23:01:38.755217075 CET44549858124.112.153.22192.168.2.8
                              Jan 14, 2025 23:01:38.755305052 CET49858445192.168.2.8124.112.153.22
                              Jan 14, 2025 23:01:38.755414963 CET49858445192.168.2.8124.112.153.22
                              Jan 14, 2025 23:01:38.755536079 CET49859445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:01:38.760376930 CET44549859124.112.153.1192.168.2.8
                              Jan 14, 2025 23:01:38.760407925 CET44549858124.112.153.22192.168.2.8
                              Jan 14, 2025 23:01:38.760440111 CET49859445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:01:38.760469913 CET49858445192.168.2.8124.112.153.22
                              Jan 14, 2025 23:01:38.760509968 CET49859445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:01:38.760838985 CET49860445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:01:38.765419006 CET44549859124.112.153.1192.168.2.8
                              Jan 14, 2025 23:01:38.765657902 CET44549860124.112.153.1192.168.2.8
                              Jan 14, 2025 23:01:38.765726089 CET49860445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:01:38.765760899 CET49860445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:01:38.765814066 CET44549859124.112.153.1192.168.2.8
                              Jan 14, 2025 23:01:38.765860081 CET49859445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:01:38.770627975 CET44549860124.112.153.1192.168.2.8
                              Jan 14, 2025 23:01:40.765521049 CET49886445192.168.2.880.198.199.219
                              Jan 14, 2025 23:01:40.770380974 CET4454988680.198.199.219192.168.2.8
                              Jan 14, 2025 23:01:40.770487070 CET49886445192.168.2.880.198.199.219
                              Jan 14, 2025 23:01:40.770515919 CET49886445192.168.2.880.198.199.219
                              Jan 14, 2025 23:01:40.770621061 CET49887445192.168.2.880.198.199.1
                              Jan 14, 2025 23:01:40.775429010 CET4454988780.198.199.1192.168.2.8
                              Jan 14, 2025 23:01:40.775502920 CET49887445192.168.2.880.198.199.1
                              Jan 14, 2025 23:01:40.775526047 CET49887445192.168.2.880.198.199.1
                              Jan 14, 2025 23:01:40.775571108 CET4454988680.198.199.219192.168.2.8
                              Jan 14, 2025 23:01:40.775758028 CET49886445192.168.2.880.198.199.219
                              Jan 14, 2025 23:01:40.775806904 CET49888445192.168.2.880.198.199.1
                              Jan 14, 2025 23:01:40.780539036 CET4454988780.198.199.1192.168.2.8
                              Jan 14, 2025 23:01:40.780601025 CET49887445192.168.2.880.198.199.1
                              Jan 14, 2025 23:01:40.780678988 CET4454988880.198.199.1192.168.2.8
                              Jan 14, 2025 23:01:40.780754089 CET49888445192.168.2.880.198.199.1
                              Jan 14, 2025 23:01:40.780834913 CET49888445192.168.2.880.198.199.1
                              Jan 14, 2025 23:01:40.785594940 CET4454988880.198.199.1192.168.2.8
                              Jan 14, 2025 23:01:42.781281948 CET49909445192.168.2.8164.80.167.66
                              Jan 14, 2025 23:01:42.786309004 CET44549909164.80.167.66192.168.2.8
                              Jan 14, 2025 23:01:42.786392927 CET49909445192.168.2.8164.80.167.66
                              Jan 14, 2025 23:01:42.786457062 CET49909445192.168.2.8164.80.167.66
                              Jan 14, 2025 23:01:42.786577940 CET49910445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:01:42.791384935 CET44549910164.80.167.1192.168.2.8
                              Jan 14, 2025 23:01:42.791543961 CET49910445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:01:42.791595936 CET44549909164.80.167.66192.168.2.8
                              Jan 14, 2025 23:01:42.791595936 CET49910445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:01:42.791647911 CET49909445192.168.2.8164.80.167.66
                              Jan 14, 2025 23:01:42.791899920 CET49911445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:01:42.796946049 CET44549910164.80.167.1192.168.2.8
                              Jan 14, 2025 23:01:42.796962976 CET44549911164.80.167.1192.168.2.8
                              Jan 14, 2025 23:01:42.797028065 CET49910445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:01:42.797029972 CET49911445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:01:42.797233105 CET49911445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:01:42.802473068 CET44549911164.80.167.1192.168.2.8
                              Jan 14, 2025 23:01:44.802350998 CET49934445192.168.2.830.211.35.13
                              Jan 14, 2025 23:01:44.807219028 CET4454993430.211.35.13192.168.2.8
                              Jan 14, 2025 23:01:44.807974100 CET49934445192.168.2.830.211.35.13
                              Jan 14, 2025 23:01:44.808024883 CET49934445192.168.2.830.211.35.13
                              Jan 14, 2025 23:01:44.808150053 CET49935445192.168.2.830.211.35.1
                              Jan 14, 2025 23:01:44.812889099 CET4454993530.211.35.1192.168.2.8
                              Jan 14, 2025 23:01:44.812908888 CET4454993430.211.35.13192.168.2.8
                              Jan 14, 2025 23:01:44.812963009 CET49935445192.168.2.830.211.35.1
                              Jan 14, 2025 23:01:44.813015938 CET49934445192.168.2.830.211.35.13
                              Jan 14, 2025 23:01:44.813050032 CET49935445192.168.2.830.211.35.1
                              Jan 14, 2025 23:01:44.813355923 CET49936445192.168.2.830.211.35.1
                              Jan 14, 2025 23:01:44.817926884 CET4454993530.211.35.1192.168.2.8
                              Jan 14, 2025 23:01:44.817991018 CET49935445192.168.2.830.211.35.1
                              Jan 14, 2025 23:01:44.818141937 CET4454993630.211.35.1192.168.2.8
                              Jan 14, 2025 23:01:44.818202972 CET49936445192.168.2.830.211.35.1
                              Jan 14, 2025 23:01:44.818319082 CET49936445192.168.2.830.211.35.1
                              Jan 14, 2025 23:01:44.823057890 CET4454993630.211.35.1192.168.2.8
                              Jan 14, 2025 23:01:46.815629959 CET49958445192.168.2.8161.78.168.218
                              Jan 14, 2025 23:01:46.820379972 CET44549958161.78.168.218192.168.2.8
                              Jan 14, 2025 23:01:46.820485115 CET49958445192.168.2.8161.78.168.218
                              Jan 14, 2025 23:01:46.820555925 CET49958445192.168.2.8161.78.168.218
                              Jan 14, 2025 23:01:46.820765972 CET49959445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:01:46.825432062 CET44549958161.78.168.218192.168.2.8
                              Jan 14, 2025 23:01:46.825546026 CET44549959161.78.168.1192.168.2.8
                              Jan 14, 2025 23:01:46.825546026 CET49958445192.168.2.8161.78.168.218
                              Jan 14, 2025 23:01:46.825630903 CET49959445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:01:46.825664997 CET49959445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:01:46.825895071 CET49960445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:01:46.830688953 CET44549959161.78.168.1192.168.2.8
                              Jan 14, 2025 23:01:46.830708981 CET44549960161.78.168.1192.168.2.8
                              Jan 14, 2025 23:01:46.830780983 CET49959445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:01:46.830805063 CET49960445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:01:46.830883026 CET49960445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:01:46.835753918 CET44549960161.78.168.1192.168.2.8
                              Jan 14, 2025 23:01:48.828694105 CET49982445192.168.2.864.73.149.115
                              Jan 14, 2025 23:01:48.833714008 CET4454998264.73.149.115192.168.2.8
                              Jan 14, 2025 23:01:48.833806038 CET49982445192.168.2.864.73.149.115
                              Jan 14, 2025 23:01:48.833882093 CET49982445192.168.2.864.73.149.115
                              Jan 14, 2025 23:01:48.833981037 CET49983445192.168.2.864.73.149.1
                              Jan 14, 2025 23:01:48.838778019 CET4454998364.73.149.1192.168.2.8
                              Jan 14, 2025 23:01:48.838835001 CET49983445192.168.2.864.73.149.1
                              Jan 14, 2025 23:01:48.838857889 CET4454998264.73.149.115192.168.2.8
                              Jan 14, 2025 23:01:48.838876009 CET49983445192.168.2.864.73.149.1
                              Jan 14, 2025 23:01:48.838921070 CET49982445192.168.2.864.73.149.115
                              Jan 14, 2025 23:01:48.839121103 CET49984445192.168.2.864.73.149.1
                              Jan 14, 2025 23:01:48.843765020 CET4454998364.73.149.1192.168.2.8
                              Jan 14, 2025 23:01:48.843833923 CET49983445192.168.2.864.73.149.1
                              Jan 14, 2025 23:01:48.843945980 CET4454998464.73.149.1192.168.2.8
                              Jan 14, 2025 23:01:48.844010115 CET49984445192.168.2.864.73.149.1
                              Jan 14, 2025 23:01:48.846399069 CET49984445192.168.2.864.73.149.1
                              Jan 14, 2025 23:01:48.851160049 CET4454998464.73.149.1192.168.2.8
                              Jan 14, 2025 23:01:50.073955059 CET4454973520.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:50.074153900 CET49735445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:50.074153900 CET49735445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:50.074153900 CET49735445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:50.079087019 CET4454973520.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:50.079097033 CET4454973520.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:50.844444036 CET50006445192.168.2.8185.163.186.24
                              Jan 14, 2025 23:01:50.849231958 CET44550006185.163.186.24192.168.2.8
                              Jan 14, 2025 23:01:50.849378109 CET50006445192.168.2.8185.163.186.24
                              Jan 14, 2025 23:01:50.849395037 CET50006445192.168.2.8185.163.186.24
                              Jan 14, 2025 23:01:50.849553108 CET50007445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:01:50.854379892 CET44550006185.163.186.24192.168.2.8
                              Jan 14, 2025 23:01:50.854404926 CET44550007185.163.186.1192.168.2.8
                              Jan 14, 2025 23:01:50.854476929 CET50006445192.168.2.8185.163.186.24
                              Jan 14, 2025 23:01:50.854515076 CET50007445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:01:50.854619026 CET50007445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:01:50.855038881 CET50008445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:01:50.859458923 CET44550007185.163.186.1192.168.2.8
                              Jan 14, 2025 23:01:50.859518051 CET50007445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:01:50.859805107 CET44550008185.163.186.1192.168.2.8
                              Jan 14, 2025 23:01:50.859882116 CET50008445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:01:50.859930992 CET50008445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:01:50.864746094 CET44550008185.163.186.1192.168.2.8
                              Jan 14, 2025 23:01:52.152216911 CET44549760147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:52.152415991 CET49760445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:52.152415991 CET49760445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:52.152496099 CET49760445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:52.157305956 CET44549760147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:52.157320023 CET44549760147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:52.859966993 CET50014445192.168.2.883.48.178.93
                              Jan 14, 2025 23:01:52.864790916 CET4455001483.48.178.93192.168.2.8
                              Jan 14, 2025 23:01:52.865880013 CET50014445192.168.2.883.48.178.93
                              Jan 14, 2025 23:01:52.865971088 CET50014445192.168.2.883.48.178.93
                              Jan 14, 2025 23:01:52.866148949 CET50015445192.168.2.883.48.178.1
                              Jan 14, 2025 23:01:52.870986938 CET4455001583.48.178.1192.168.2.8
                              Jan 14, 2025 23:01:52.871051073 CET4455001483.48.178.93192.168.2.8
                              Jan 14, 2025 23:01:52.871134043 CET50014445192.168.2.883.48.178.93
                              Jan 14, 2025 23:01:52.871438026 CET50016445192.168.2.883.48.178.1
                              Jan 14, 2025 23:01:52.871439934 CET50015445192.168.2.883.48.178.1
                              Jan 14, 2025 23:01:52.876298904 CET4455001683.48.178.1192.168.2.8
                              Jan 14, 2025 23:01:52.876395941 CET50016445192.168.2.883.48.178.1
                              Jan 14, 2025 23:01:52.876426935 CET50016445192.168.2.883.48.178.1
                              Jan 14, 2025 23:01:52.876477003 CET4455001583.48.178.1192.168.2.8
                              Jan 14, 2025 23:01:52.876533031 CET50015445192.168.2.883.48.178.1
                              Jan 14, 2025 23:01:52.881397009 CET4455001683.48.178.1192.168.2.8
                              Jan 14, 2025 23:01:53.078475952 CET50017445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:53.083328009 CET4455001720.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:53.083435059 CET50017445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:53.083520889 CET50017445192.168.2.820.51.106.1
                              Jan 14, 2025 23:01:53.088285923 CET4455001720.51.106.1192.168.2.8
                              Jan 14, 2025 23:01:54.106416941 CET44549785157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:54.106519938 CET49785445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:54.106579065 CET49785445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:54.106654882 CET49785445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:54.111502886 CET44549785157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:54.111551046 CET44549785157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:54.594002962 CET44549791194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:54.594080925 CET49791445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:54.594212055 CET49791445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:54.594274044 CET49791445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:54.599025965 CET44549791194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:54.599142075 CET44549791194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:54.875948906 CET50018445192.168.2.8206.223.88.94
                              Jan 14, 2025 23:01:54.880825996 CET44550018206.223.88.94192.168.2.8
                              Jan 14, 2025 23:01:54.880954981 CET50018445192.168.2.8206.223.88.94
                              Jan 14, 2025 23:01:54.880999088 CET50018445192.168.2.8206.223.88.94
                              Jan 14, 2025 23:01:54.881134987 CET50019445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:01:54.885870934 CET44550018206.223.88.94192.168.2.8
                              Jan 14, 2025 23:01:54.885946989 CET44550018206.223.88.94192.168.2.8
                              Jan 14, 2025 23:01:54.885962009 CET44550019206.223.88.1192.168.2.8
                              Jan 14, 2025 23:01:54.886008978 CET50018445192.168.2.8206.223.88.94
                              Jan 14, 2025 23:01:54.886039972 CET50019445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:01:54.886121035 CET50019445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:01:54.886344910 CET50020445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:01:54.890994072 CET44550019206.223.88.1192.168.2.8
                              Jan 14, 2025 23:01:54.891060114 CET50019445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:01:54.891130924 CET44550020206.223.88.1192.168.2.8
                              Jan 14, 2025 23:01:54.891196966 CET50020445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:01:54.891335011 CET50020445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:01:54.896054029 CET44550020206.223.88.1192.168.2.8
                              Jan 14, 2025 23:01:55.156600952 CET50021445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:55.161417007 CET44550021147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:55.161478043 CET50021445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:55.161510944 CET50021445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:01:55.166649103 CET44550021147.209.87.1192.168.2.8
                              Jan 14, 2025 23:01:56.122009039 CET44549811188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:56.122144938 CET49811445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:56.122232914 CET49811445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:56.122313976 CET49811445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:56.128089905 CET44549811188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:56.128123045 CET44549811188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:56.934262037 CET50022445192.168.2.8208.232.176.98
                              Jan 14, 2025 23:01:56.939423084 CET44550022208.232.176.98192.168.2.8
                              Jan 14, 2025 23:01:56.939519882 CET50022445192.168.2.8208.232.176.98
                              Jan 14, 2025 23:01:56.939598083 CET50022445192.168.2.8208.232.176.98
                              Jan 14, 2025 23:01:56.939727068 CET50023445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:01:56.944530964 CET44550022208.232.176.98192.168.2.8
                              Jan 14, 2025 23:01:56.944569111 CET44550023208.232.176.1192.168.2.8
                              Jan 14, 2025 23:01:56.944601059 CET50022445192.168.2.8208.232.176.98
                              Jan 14, 2025 23:01:56.944632053 CET50023445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:01:56.944700956 CET50023445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:01:56.945022106 CET50024445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:01:56.949615002 CET44550023208.232.176.1192.168.2.8
                              Jan 14, 2025 23:01:56.949671984 CET50023445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:01:56.949907064 CET44550024208.232.176.1192.168.2.8
                              Jan 14, 2025 23:01:56.949986935 CET50024445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:01:56.970729113 CET50024445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:01:56.975549936 CET44550024208.232.176.1192.168.2.8
                              Jan 14, 2025 23:01:57.112514973 CET50025445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:57.153563023 CET44550025157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:57.153645039 CET50025445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:57.153727055 CET50025445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:01:57.160845995 CET44550025157.200.46.1192.168.2.8
                              Jan 14, 2025 23:01:57.609847069 CET50026445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:57.614741087 CET44550026194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:57.614871025 CET50026445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:57.614965916 CET50026445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:01:57.621969938 CET44550026194.143.231.2192.168.2.8
                              Jan 14, 2025 23:01:58.105725050 CET44549834210.196.38.1192.168.2.8
                              Jan 14, 2025 23:01:58.105844975 CET49834445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:58.105967045 CET49834445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:58.105967999 CET49834445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:01:58.110843897 CET44549834210.196.38.1192.168.2.8
                              Jan 14, 2025 23:01:58.110877037 CET44549834210.196.38.1192.168.2.8
                              Jan 14, 2025 23:01:58.938091993 CET50027445192.168.2.8105.221.169.115
                              Jan 14, 2025 23:01:58.942970991 CET44550027105.221.169.115192.168.2.8
                              Jan 14, 2025 23:01:58.943058014 CET50027445192.168.2.8105.221.169.115
                              Jan 14, 2025 23:01:58.943093061 CET50027445192.168.2.8105.221.169.115
                              Jan 14, 2025 23:01:58.943226099 CET50028445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:01:58.948075056 CET44550028105.221.169.1192.168.2.8
                              Jan 14, 2025 23:01:58.948147058 CET50028445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:01:58.948168993 CET50028445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:01:58.948174000 CET44550027105.221.169.115192.168.2.8
                              Jan 14, 2025 23:01:58.948236942 CET50027445192.168.2.8105.221.169.115
                              Jan 14, 2025 23:01:58.948409081 CET50029445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:01:58.953154087 CET44550028105.221.169.1192.168.2.8
                              Jan 14, 2025 23:01:58.953212976 CET50028445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:01:58.953300953 CET44550029105.221.169.1192.168.2.8
                              Jan 14, 2025 23:01:58.953368902 CET50029445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:01:58.953532934 CET50029445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:01:58.958339930 CET44550029105.221.169.1192.168.2.8
                              Jan 14, 2025 23:01:59.125560999 CET50030445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:59.130419016 CET44550030188.147.52.1192.168.2.8
                              Jan 14, 2025 23:01:59.130533934 CET50030445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:59.130593061 CET50030445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:01:59.135329008 CET44550030188.147.52.1192.168.2.8
                              Jan 14, 2025 23:02:00.137939930 CET44549860124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:00.138015985 CET49860445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:00.138084888 CET49860445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:00.138084888 CET49860445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:00.142930031 CET44549860124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:00.142940044 CET44549860124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:00.954044104 CET50031445192.168.2.8110.194.28.69
                              Jan 14, 2025 23:02:00.958846092 CET44550031110.194.28.69192.168.2.8
                              Jan 14, 2025 23:02:00.958931923 CET50031445192.168.2.8110.194.28.69
                              Jan 14, 2025 23:02:00.959038973 CET50031445192.168.2.8110.194.28.69
                              Jan 14, 2025 23:02:00.959238052 CET50032445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:00.964029074 CET44550031110.194.28.69192.168.2.8
                              Jan 14, 2025 23:02:00.964039087 CET44550032110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:00.964078903 CET50031445192.168.2.8110.194.28.69
                              Jan 14, 2025 23:02:00.964129925 CET50032445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:00.964190006 CET50032445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:00.964464903 CET50033445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:00.969225883 CET44550032110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:00.969275951 CET44550033110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:00.969326973 CET50032445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:00.969372034 CET50033445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:00.969407082 CET50033445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:00.974150896 CET44550033110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:01.110184908 CET50034445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:02:01.115000010 CET44550034210.196.38.1192.168.2.8
                              Jan 14, 2025 23:02:01.115087986 CET50034445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:02:01.115144014 CET50034445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:02:01.119908094 CET44550034210.196.38.1192.168.2.8
                              Jan 14, 2025 23:02:02.154479027 CET4454988880.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:02.154575109 CET49888445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:02.154614925 CET49888445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:02.156872988 CET49888445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:02.159729004 CET4454988880.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:02.162344933 CET4454988880.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:02.831934929 CET50035445192.168.2.8128.83.164.44
                              Jan 14, 2025 23:02:02.836869955 CET44550035128.83.164.44192.168.2.8
                              Jan 14, 2025 23:02:02.836951971 CET50035445192.168.2.8128.83.164.44
                              Jan 14, 2025 23:02:02.836982965 CET50035445192.168.2.8128.83.164.44
                              Jan 14, 2025 23:02:02.837132931 CET50036445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:02.842432976 CET44550036128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:02.842485905 CET44550035128.83.164.44192.168.2.8
                              Jan 14, 2025 23:02:02.842520952 CET50036445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:02.842520952 CET50036445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:02.842540979 CET50035445192.168.2.8128.83.164.44
                              Jan 14, 2025 23:02:02.842875957 CET50037445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:02.847932100 CET44550036128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:02.847980976 CET44550037128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:02.848026991 CET50036445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:02.848098040 CET50037445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:02.848148108 CET50037445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:02.852957964 CET44550037128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:03.141721964 CET50038445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:03.146522045 CET44550038124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:03.146601915 CET50038445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:03.146671057 CET50038445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:03.152496099 CET44550038124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:04.152808905 CET44549911164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:04.153014898 CET49911445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:04.153014898 CET49911445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:04.153111935 CET49911445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:04.158018112 CET44549911164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:04.158056974 CET44549911164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:04.579508066 CET50039445192.168.2.8181.179.19.120
                              Jan 14, 2025 23:02:04.584327936 CET44550039181.179.19.120192.168.2.8
                              Jan 14, 2025 23:02:04.584450006 CET50039445192.168.2.8181.179.19.120
                              Jan 14, 2025 23:02:04.584520102 CET50039445192.168.2.8181.179.19.120
                              Jan 14, 2025 23:02:04.584722996 CET50040445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:04.589395046 CET44550039181.179.19.120192.168.2.8
                              Jan 14, 2025 23:02:04.589555979 CET44550040181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:04.589560986 CET50039445192.168.2.8181.179.19.120
                              Jan 14, 2025 23:02:04.589638948 CET50040445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:04.589760065 CET50040445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:04.590143919 CET50041445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:04.594589949 CET44550040181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:04.594671965 CET50040445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:04.594959021 CET44550041181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:04.595024109 CET50041445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:04.595067024 CET50041445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:04.599793911 CET44550041181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:05.172593117 CET50042445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:05.177433968 CET4455004280.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:05.177515984 CET50042445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:05.177552938 CET50042445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:05.182341099 CET4455004280.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:06.219784021 CET50043445192.168.2.873.163.6.192
                              Jan 14, 2025 23:02:06.224832058 CET4455004373.163.6.192192.168.2.8
                              Jan 14, 2025 23:02:06.226310968 CET50043445192.168.2.873.163.6.192
                              Jan 14, 2025 23:02:06.226336002 CET50043445192.168.2.873.163.6.192
                              Jan 14, 2025 23:02:06.226495028 CET50044445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:06.231285095 CET4455004473.163.6.1192.168.2.8
                              Jan 14, 2025 23:02:06.231383085 CET4455004373.163.6.192192.168.2.8
                              Jan 14, 2025 23:02:06.231493950 CET50043445192.168.2.873.163.6.192
                              Jan 14, 2025 23:02:06.231513023 CET50044445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:06.231638908 CET50044445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:06.232048988 CET50045445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:06.236474991 CET4455004473.163.6.1192.168.2.8
                              Jan 14, 2025 23:02:06.236641884 CET4454993630.211.35.1192.168.2.8
                              Jan 14, 2025 23:02:06.236711979 CET50044445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:06.236733913 CET49936445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:06.236757040 CET49936445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:06.236809015 CET4455004573.163.6.1192.168.2.8
                              Jan 14, 2025 23:02:06.236815929 CET49936445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:06.238270998 CET50045445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:06.238296986 CET50045445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:06.241573095 CET4454993630.211.35.1192.168.2.8
                              Jan 14, 2025 23:02:06.241597891 CET4454993630.211.35.1192.168.2.8
                              Jan 14, 2025 23:02:06.243092060 CET4455004573.163.6.1192.168.2.8
                              Jan 14, 2025 23:02:07.159926891 CET50046445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:07.164736986 CET44550046164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:07.164835930 CET50046445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:07.164874077 CET50046445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:07.169646025 CET44550046164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:07.751260996 CET50047445192.168.2.886.93.55.193
                              Jan 14, 2025 23:02:07.756162882 CET4455004786.93.55.193192.168.2.8
                              Jan 14, 2025 23:02:07.756273985 CET50047445192.168.2.886.93.55.193
                              Jan 14, 2025 23:02:07.756314993 CET50047445192.168.2.886.93.55.193
                              Jan 14, 2025 23:02:07.756504059 CET50048445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:07.761229992 CET4455004786.93.55.193192.168.2.8
                              Jan 14, 2025 23:02:07.761308908 CET50047445192.168.2.886.93.55.193
                              Jan 14, 2025 23:02:07.761331081 CET4455004886.93.55.1192.168.2.8
                              Jan 14, 2025 23:02:07.761392117 CET50048445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:07.761411905 CET50048445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:07.761667967 CET50049445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:07.766405106 CET4455004886.93.55.1192.168.2.8
                              Jan 14, 2025 23:02:07.766472101 CET50048445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:07.766483068 CET4455004986.93.55.1192.168.2.8
                              Jan 14, 2025 23:02:07.766546965 CET50049445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:07.766565084 CET50049445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:07.771370888 CET4455004986.93.55.1192.168.2.8
                              Jan 14, 2025 23:02:08.201896906 CET44549960161.78.168.1192.168.2.8
                              Jan 14, 2025 23:02:08.202111959 CET49960445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:02:08.202111959 CET49960445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:02:08.202111959 CET49960445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:02:08.207410097 CET44549960161.78.168.1192.168.2.8
                              Jan 14, 2025 23:02:08.207421064 CET44549960161.78.168.1192.168.2.8
                              Jan 14, 2025 23:02:09.173001051 CET50050445192.168.2.861.143.77.23
                              Jan 14, 2025 23:02:09.178046942 CET4455005061.143.77.23192.168.2.8
                              Jan 14, 2025 23:02:09.178138971 CET50050445192.168.2.861.143.77.23
                              Jan 14, 2025 23:02:09.178177118 CET50050445192.168.2.861.143.77.23
                              Jan 14, 2025 23:02:09.178512096 CET50051445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:09.183363914 CET4455005061.143.77.23192.168.2.8
                              Jan 14, 2025 23:02:09.183404922 CET4455005161.143.77.1192.168.2.8
                              Jan 14, 2025 23:02:09.183458090 CET50050445192.168.2.861.143.77.23
                              Jan 14, 2025 23:02:09.183526993 CET50051445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:09.183604002 CET50051445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:09.184091091 CET50052445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:09.188509941 CET4455005161.143.77.1192.168.2.8
                              Jan 14, 2025 23:02:09.188584089 CET50051445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:09.188922882 CET4455005261.143.77.1192.168.2.8
                              Jan 14, 2025 23:02:09.189003944 CET50052445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:09.189044952 CET50052445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:09.193892956 CET4455005261.143.77.1192.168.2.8
                              Jan 14, 2025 23:02:09.250771999 CET50053445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:09.255745888 CET4455005330.211.35.1192.168.2.8
                              Jan 14, 2025 23:02:09.255847931 CET50053445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:09.255868912 CET50053445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:09.260859013 CET4455005330.211.35.1192.168.2.8
                              Jan 14, 2025 23:02:10.215948105 CET4454998464.73.149.1192.168.2.8
                              Jan 14, 2025 23:02:10.216092110 CET49984445192.168.2.864.73.149.1
                              Jan 14, 2025 23:02:10.216092110 CET49984445192.168.2.864.73.149.1
                              Jan 14, 2025 23:02:10.216121912 CET49984445192.168.2.864.73.149.1
                              Jan 14, 2025 23:02:10.221064091 CET4454998464.73.149.1192.168.2.8
                              Jan 14, 2025 23:02:10.221225977 CET4454998464.73.149.1192.168.2.8
                              Jan 14, 2025 23:02:10.501127958 CET50054445192.168.2.8168.195.221.143
                              Jan 14, 2025 23:02:10.506166935 CET44550054168.195.221.143192.168.2.8
                              Jan 14, 2025 23:02:10.506422997 CET50054445192.168.2.8168.195.221.143
                              Jan 14, 2025 23:02:10.506508112 CET50054445192.168.2.8168.195.221.143
                              Jan 14, 2025 23:02:10.506535053 CET50055445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:10.511394024 CET44550055168.195.221.1192.168.2.8
                              Jan 14, 2025 23:02:10.511533022 CET44550054168.195.221.143192.168.2.8
                              Jan 14, 2025 23:02:10.511635065 CET50054445192.168.2.8168.195.221.143
                              Jan 14, 2025 23:02:10.511708975 CET50055445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:10.511708975 CET50055445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:10.511923075 CET50056445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:10.516959906 CET44550056168.195.221.1192.168.2.8
                              Jan 14, 2025 23:02:10.516989946 CET44550055168.195.221.1192.168.2.8
                              Jan 14, 2025 23:02:10.517061949 CET50055445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:10.517069101 CET50056445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:10.517127037 CET50056445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:10.521920919 CET44550056168.195.221.1192.168.2.8
                              Jan 14, 2025 23:02:11.204062939 CET50057445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:02:11.208962917 CET44550057161.78.168.1192.168.2.8
                              Jan 14, 2025 23:02:11.209249020 CET50057445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:02:11.209276915 CET50057445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:02:11.214025021 CET44550057161.78.168.1192.168.2.8
                              Jan 14, 2025 23:02:11.735662937 CET50058445192.168.2.8198.1.189.185
                              Jan 14, 2025 23:02:11.740488052 CET44550058198.1.189.185192.168.2.8
                              Jan 14, 2025 23:02:11.740633965 CET50058445192.168.2.8198.1.189.185
                              Jan 14, 2025 23:02:11.740740061 CET50058445192.168.2.8198.1.189.185
                              Jan 14, 2025 23:02:11.740943909 CET50059445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:11.745613098 CET44550058198.1.189.185192.168.2.8
                              Jan 14, 2025 23:02:11.745706081 CET50058445192.168.2.8198.1.189.185
                              Jan 14, 2025 23:02:11.745744944 CET44550059198.1.189.1192.168.2.8
                              Jan 14, 2025 23:02:11.745816946 CET50059445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:11.745915890 CET50059445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:11.746411085 CET50060445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:11.750854969 CET44550059198.1.189.1192.168.2.8
                              Jan 14, 2025 23:02:11.750915051 CET50059445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:11.751199007 CET44550060198.1.189.1192.168.2.8
                              Jan 14, 2025 23:02:11.751270056 CET50060445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:11.751298904 CET50060445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:11.756037951 CET44550060198.1.189.1192.168.2.8
                              Jan 14, 2025 23:02:12.248819113 CET44550008185.163.186.1192.168.2.8
                              Jan 14, 2025 23:02:12.249093056 CET50008445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:02:12.249093056 CET50008445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:02:12.249094009 CET50008445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:02:12.253983021 CET44550008185.163.186.1192.168.2.8
                              Jan 14, 2025 23:02:12.253998041 CET44550008185.163.186.1192.168.2.8
                              Jan 14, 2025 23:02:12.892076015 CET50061445192.168.2.864.155.30.226
                              Jan 14, 2025 23:02:12.897304058 CET4455006164.155.30.226192.168.2.8
                              Jan 14, 2025 23:02:12.897418022 CET50061445192.168.2.864.155.30.226
                              Jan 14, 2025 23:02:12.900480986 CET50061445192.168.2.864.155.30.226
                              Jan 14, 2025 23:02:12.900851965 CET50062445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:12.905287027 CET4455006164.155.30.226192.168.2.8
                              Jan 14, 2025 23:02:12.905370951 CET50061445192.168.2.864.155.30.226
                              Jan 14, 2025 23:02:12.905621052 CET4455006264.155.30.1192.168.2.8
                              Jan 14, 2025 23:02:12.905688047 CET50062445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:12.905728102 CET50062445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:12.906054974 CET50063445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:12.910859108 CET4455006264.155.30.1192.168.2.8
                              Jan 14, 2025 23:02:12.910868883 CET4455006364.155.30.1192.168.2.8
                              Jan 14, 2025 23:02:12.910922050 CET50062445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:12.910952091 CET50063445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:12.910976887 CET50063445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:12.915745974 CET4455006364.155.30.1192.168.2.8
                              Jan 14, 2025 23:02:13.219691992 CET50064445192.168.2.864.73.149.1
                              Jan 14, 2025 23:02:13.224535942 CET4455006464.73.149.1192.168.2.8
                              Jan 14, 2025 23:02:13.224662066 CET50064445192.168.2.864.73.149.1
                              Jan 14, 2025 23:02:13.224708080 CET50064445192.168.2.864.73.149.1
                              Jan 14, 2025 23:02:13.229477882 CET4455006464.73.149.1192.168.2.8
                              Jan 14, 2025 23:02:13.970091105 CET50065445192.168.2.8166.19.84.11
                              Jan 14, 2025 23:02:13.975132942 CET44550065166.19.84.11192.168.2.8
                              Jan 14, 2025 23:02:13.975261927 CET50065445192.168.2.8166.19.84.11
                              Jan 14, 2025 23:02:13.975308895 CET50065445192.168.2.8166.19.84.11
                              Jan 14, 2025 23:02:13.975593090 CET50066445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:13.980411053 CET44550065166.19.84.11192.168.2.8
                              Jan 14, 2025 23:02:13.980470896 CET44550066166.19.84.1192.168.2.8
                              Jan 14, 2025 23:02:13.980478048 CET50065445192.168.2.8166.19.84.11
                              Jan 14, 2025 23:02:13.980535984 CET50066445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:13.980637074 CET50066445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:13.980887890 CET50067445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:13.985769987 CET44550066166.19.84.1192.168.2.8
                              Jan 14, 2025 23:02:13.985827923 CET44550067166.19.84.1192.168.2.8
                              Jan 14, 2025 23:02:13.985830069 CET50066445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:13.985889912 CET50067445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:13.985939980 CET50067445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:13.991307974 CET44550067166.19.84.1192.168.2.8
                              Jan 14, 2025 23:02:14.231829882 CET4455001683.48.178.1192.168.2.8
                              Jan 14, 2025 23:02:14.231920958 CET50016445192.168.2.883.48.178.1
                              Jan 14, 2025 23:02:14.231973886 CET50016445192.168.2.883.48.178.1
                              Jan 14, 2025 23:02:14.232028961 CET50016445192.168.2.883.48.178.1
                              Jan 14, 2025 23:02:14.236767054 CET4455001683.48.178.1192.168.2.8
                              Jan 14, 2025 23:02:14.236821890 CET4455001683.48.178.1192.168.2.8
                              Jan 14, 2025 23:02:14.559701920 CET4455001720.51.106.1192.168.2.8
                              Jan 14, 2025 23:02:14.559824944 CET50017445192.168.2.820.51.106.1
                              Jan 14, 2025 23:02:14.559923887 CET50017445192.168.2.820.51.106.1
                              Jan 14, 2025 23:02:14.559923887 CET50017445192.168.2.820.51.106.1
                              Jan 14, 2025 23:02:14.564738989 CET4455001720.51.106.1192.168.2.8
                              Jan 14, 2025 23:02:14.564795971 CET4455001720.51.106.1192.168.2.8
                              Jan 14, 2025 23:02:14.626065969 CET50068445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:14.631122112 CET4455006820.51.106.2192.168.2.8
                              Jan 14, 2025 23:02:14.631241083 CET50068445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:14.631283045 CET50068445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:14.631747007 CET50069445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:14.636337042 CET4455006820.51.106.2192.168.2.8
                              Jan 14, 2025 23:02:14.636420012 CET50068445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:14.636707067 CET4455006920.51.106.2192.168.2.8
                              Jan 14, 2025 23:02:14.636786938 CET50069445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:14.636830091 CET50069445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:14.641657114 CET4455006920.51.106.2192.168.2.8
                              Jan 14, 2025 23:02:14.985927105 CET50070445192.168.2.811.159.44.80
                              Jan 14, 2025 23:02:14.991039991 CET4455007011.159.44.80192.168.2.8
                              Jan 14, 2025 23:02:14.991162062 CET50070445192.168.2.811.159.44.80
                              Jan 14, 2025 23:02:14.991244078 CET50070445192.168.2.811.159.44.80
                              Jan 14, 2025 23:02:14.991465092 CET50071445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:15.000499010 CET4455007111.159.44.1192.168.2.8
                              Jan 14, 2025 23:02:15.000582933 CET50071445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:15.000602961 CET50071445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:15.001086950 CET50072445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:15.003046989 CET4455007011.159.44.80192.168.2.8
                              Jan 14, 2025 23:02:15.003135920 CET50070445192.168.2.811.159.44.80
                              Jan 14, 2025 23:02:15.005893946 CET4455007111.159.44.1192.168.2.8
                              Jan 14, 2025 23:02:15.005954027 CET50071445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:15.006031036 CET4455007211.159.44.1192.168.2.8
                              Jan 14, 2025 23:02:15.006103039 CET50072445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:15.006145000 CET50072445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:15.010957003 CET4455007211.159.44.1192.168.2.8
                              Jan 14, 2025 23:02:15.250946045 CET50073445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:02:15.255812883 CET44550073185.163.186.1192.168.2.8
                              Jan 14, 2025 23:02:15.255911112 CET50073445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:02:15.255938053 CET50073445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:02:15.261802912 CET44550073185.163.186.1192.168.2.8
                              Jan 14, 2025 23:02:15.923454046 CET50074445192.168.2.816.222.176.94
                              Jan 14, 2025 23:02:15.928654909 CET4455007416.222.176.94192.168.2.8
                              Jan 14, 2025 23:02:15.928767920 CET50074445192.168.2.816.222.176.94
                              Jan 14, 2025 23:02:15.928884983 CET50074445192.168.2.816.222.176.94
                              Jan 14, 2025 23:02:15.929141998 CET50075445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:15.933792114 CET4455007416.222.176.94192.168.2.8
                              Jan 14, 2025 23:02:15.933861971 CET50074445192.168.2.816.222.176.94
                              Jan 14, 2025 23:02:15.934005022 CET4455007516.222.176.1192.168.2.8
                              Jan 14, 2025 23:02:15.934175014 CET50075445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:15.934175014 CET50075445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:15.934523106 CET50076445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:15.939466953 CET4455007516.222.176.1192.168.2.8
                              Jan 14, 2025 23:02:15.939541101 CET4455007616.222.176.1192.168.2.8
                              Jan 14, 2025 23:02:15.939577103 CET50075445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:15.939599037 CET50076445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:15.939625978 CET50076445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:15.944478035 CET4455007616.222.176.1192.168.2.8
                              Jan 14, 2025 23:02:16.268635035 CET44550020206.223.88.1192.168.2.8
                              Jan 14, 2025 23:02:16.268702984 CET50020445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:02:16.268740892 CET50020445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:02:16.268789053 CET50020445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:02:16.274871111 CET44550020206.223.88.1192.168.2.8
                              Jan 14, 2025 23:02:16.274918079 CET44550020206.223.88.1192.168.2.8
                              Jan 14, 2025 23:02:16.544317961 CET44550021147.209.87.1192.168.2.8
                              Jan 14, 2025 23:02:16.544512987 CET50021445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:02:16.544619083 CET50021445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:02:16.544694901 CET50021445192.168.2.8147.209.87.1
                              Jan 14, 2025 23:02:16.549422026 CET44550021147.209.87.1192.168.2.8
                              Jan 14, 2025 23:02:16.549478054 CET44550021147.209.87.1192.168.2.8
                              Jan 14, 2025 23:02:16.610609055 CET50078445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:16.615525961 CET44550078147.209.87.2192.168.2.8
                              Jan 14, 2025 23:02:16.615700960 CET50078445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:16.615798950 CET50078445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:16.616417885 CET50079445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:16.623429060 CET44550078147.209.87.2192.168.2.8
                              Jan 14, 2025 23:02:16.623461962 CET44550079147.209.87.2192.168.2.8
                              Jan 14, 2025 23:02:16.623522043 CET50078445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:16.623590946 CET50079445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:16.623625994 CET50079445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:16.628870964 CET44550079147.209.87.2192.168.2.8
                              Jan 14, 2025 23:02:16.798207045 CET50080445192.168.2.8107.176.182.14
                              Jan 14, 2025 23:02:16.803086996 CET44550080107.176.182.14192.168.2.8
                              Jan 14, 2025 23:02:16.803195953 CET50080445192.168.2.8107.176.182.14
                              Jan 14, 2025 23:02:16.803354025 CET50080445192.168.2.8107.176.182.14
                              Jan 14, 2025 23:02:16.803628922 CET50081445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:16.808232069 CET44550080107.176.182.14192.168.2.8
                              Jan 14, 2025 23:02:16.808397055 CET50080445192.168.2.8107.176.182.14
                              Jan 14, 2025 23:02:16.808459044 CET44550081107.176.182.1192.168.2.8
                              Jan 14, 2025 23:02:16.808538914 CET50081445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:16.808538914 CET50081445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:16.808819056 CET50082445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:16.813497066 CET44550081107.176.182.1192.168.2.8
                              Jan 14, 2025 23:02:16.813590050 CET50081445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:16.813678026 CET44550082107.176.182.1192.168.2.8
                              Jan 14, 2025 23:02:16.813741922 CET50082445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:16.813757896 CET50082445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:16.818573952 CET44550082107.176.182.1192.168.2.8
                              Jan 14, 2025 23:02:17.235681057 CET50083445192.168.2.883.48.178.1
                              Jan 14, 2025 23:02:17.240572929 CET4455008383.48.178.1192.168.2.8
                              Jan 14, 2025 23:02:17.240657091 CET50083445192.168.2.883.48.178.1
                              Jan 14, 2025 23:02:17.240696907 CET50083445192.168.2.883.48.178.1
                              Jan 14, 2025 23:02:17.245452881 CET4455008383.48.178.1192.168.2.8
                              Jan 14, 2025 23:02:17.627590895 CET50084445192.168.2.8139.172.220.19
                              Jan 14, 2025 23:02:17.632452965 CET44550084139.172.220.19192.168.2.8
                              Jan 14, 2025 23:02:17.632539034 CET50084445192.168.2.8139.172.220.19
                              Jan 14, 2025 23:02:17.632581949 CET50084445192.168.2.8139.172.220.19
                              Jan 14, 2025 23:02:17.632657051 CET50085445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:17.637394905 CET44550085139.172.220.1192.168.2.8
                              Jan 14, 2025 23:02:17.637455940 CET50085445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:17.637475014 CET50085445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:17.637670040 CET50086445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:17.637757063 CET44550084139.172.220.19192.168.2.8
                              Jan 14, 2025 23:02:17.637815952 CET50084445192.168.2.8139.172.220.19
                              Jan 14, 2025 23:02:17.642402887 CET44550086139.172.220.1192.168.2.8
                              Jan 14, 2025 23:02:17.642478943 CET50086445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:17.642494917 CET44550085139.172.220.1192.168.2.8
                              Jan 14, 2025 23:02:17.642524004 CET50086445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:17.642540932 CET50085445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:17.647402048 CET44550086139.172.220.1192.168.2.8
                              Jan 14, 2025 23:02:18.345047951 CET44550024208.232.176.1192.168.2.8
                              Jan 14, 2025 23:02:18.345143080 CET50024445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:02:18.345205069 CET50024445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:02:18.345262051 CET50024445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:02:18.350255013 CET44550024208.232.176.1192.168.2.8
                              Jan 14, 2025 23:02:18.350270033 CET44550024208.232.176.1192.168.2.8
                              Jan 14, 2025 23:02:18.392242908 CET50087445192.168.2.882.182.10.107
                              Jan 14, 2025 23:02:18.397342920 CET4455008782.182.10.107192.168.2.8
                              Jan 14, 2025 23:02:18.397463083 CET50087445192.168.2.882.182.10.107
                              Jan 14, 2025 23:02:18.397553921 CET50087445192.168.2.882.182.10.107
                              Jan 14, 2025 23:02:18.397653103 CET50088445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:18.402431011 CET4455008882.182.10.1192.168.2.8
                              Jan 14, 2025 23:02:18.402498007 CET50088445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:18.402524948 CET50088445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:18.402590990 CET4455008782.182.10.107192.168.2.8
                              Jan 14, 2025 23:02:18.402668953 CET4455008782.182.10.107192.168.2.8
                              Jan 14, 2025 23:02:18.402725935 CET50087445192.168.2.882.182.10.107
                              Jan 14, 2025 23:02:18.402807951 CET50089445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:18.408303022 CET4455008982.182.10.1192.168.2.8
                              Jan 14, 2025 23:02:18.408369064 CET50089445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:18.408436060 CET50089445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:18.409079075 CET4455008882.182.10.1192.168.2.8
                              Jan 14, 2025 23:02:18.409127951 CET50088445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:18.413310051 CET4455008982.182.10.1192.168.2.8
                              Jan 14, 2025 23:02:18.564050913 CET44550025157.200.46.1192.168.2.8
                              Jan 14, 2025 23:02:18.564145088 CET50025445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:02:18.564235926 CET50025445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:02:18.564316034 CET50025445192.168.2.8157.200.46.1
                              Jan 14, 2025 23:02:18.568953037 CET44550025157.200.46.1192.168.2.8
                              Jan 14, 2025 23:02:18.569055080 CET44550025157.200.46.1192.168.2.8
                              Jan 14, 2025 23:02:18.626173973 CET50090445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:18.631030083 CET44550090157.200.46.2192.168.2.8
                              Jan 14, 2025 23:02:18.631098986 CET50090445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:18.631145954 CET50090445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:18.631572962 CET50091445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:18.636097908 CET44550090157.200.46.2192.168.2.8
                              Jan 14, 2025 23:02:18.636156082 CET50090445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:18.636316061 CET44550091157.200.46.2192.168.2.8
                              Jan 14, 2025 23:02:18.636382103 CET50091445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:18.636421919 CET50091445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:18.641215086 CET44550091157.200.46.2192.168.2.8
                              Jan 14, 2025 23:02:18.997641087 CET44550026194.143.231.2192.168.2.8
                              Jan 14, 2025 23:02:18.997745991 CET50026445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:02:18.997817039 CET50026445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:02:18.997895956 CET50026445192.168.2.8194.143.231.2
                              Jan 14, 2025 23:02:19.003005981 CET44550026194.143.231.2192.168.2.8
                              Jan 14, 2025 23:02:19.003052950 CET44550026194.143.231.2192.168.2.8
                              Jan 14, 2025 23:02:19.063807964 CET50092445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:19.068769932 CET44550092194.143.231.3192.168.2.8
                              Jan 14, 2025 23:02:19.068902016 CET50092445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:19.069003105 CET50092445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:19.069550037 CET50093445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:19.073981047 CET44550092194.143.231.3192.168.2.8
                              Jan 14, 2025 23:02:19.074058056 CET50092445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:19.074321985 CET44550093194.143.231.3192.168.2.8
                              Jan 14, 2025 23:02:19.074384928 CET50093445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:19.078249931 CET50093445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:19.083093882 CET44550093194.143.231.3192.168.2.8
                              Jan 14, 2025 23:02:19.282372952 CET50095445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:02:19.287367105 CET44550095206.223.88.1192.168.2.8
                              Jan 14, 2025 23:02:19.287564039 CET50095445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:02:19.287612915 CET50095445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:02:19.292382002 CET44550095206.223.88.1192.168.2.8
                              Jan 14, 2025 23:02:20.363507032 CET44550029105.221.169.1192.168.2.8
                              Jan 14, 2025 23:02:20.363782883 CET50029445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:02:20.363782883 CET50029445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:02:20.363782883 CET50029445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:02:20.371675968 CET44550029105.221.169.1192.168.2.8
                              Jan 14, 2025 23:02:20.371849060 CET44550029105.221.169.1192.168.2.8
                              Jan 14, 2025 23:02:20.501698971 CET44550030188.147.52.1192.168.2.8
                              Jan 14, 2025 23:02:20.501787901 CET50030445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:02:20.501900911 CET50030445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:02:20.501967907 CET50030445192.168.2.8188.147.52.1
                              Jan 14, 2025 23:02:20.507179022 CET44550030188.147.52.1192.168.2.8
                              Jan 14, 2025 23:02:20.507208109 CET44550030188.147.52.1192.168.2.8
                              Jan 14, 2025 23:02:20.563704967 CET50099445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:20.569080114 CET44550099188.147.52.2192.168.2.8
                              Jan 14, 2025 23:02:20.569156885 CET50099445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:20.569195032 CET50099445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:20.569883108 CET50100445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:20.574837923 CET44550099188.147.52.2192.168.2.8
                              Jan 14, 2025 23:02:20.574897051 CET50099445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:20.575196028 CET44550100188.147.52.2192.168.2.8
                              Jan 14, 2025 23:02:20.575267076 CET50100445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:20.575328112 CET50100445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:20.580719948 CET44550100188.147.52.2192.168.2.8
                              Jan 14, 2025 23:02:21.360380888 CET50104445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:02:21.365330935 CET44550104208.232.176.1192.168.2.8
                              Jan 14, 2025 23:02:21.365432978 CET50104445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:02:21.365456104 CET50104445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:02:21.371139050 CET44550104208.232.176.1192.168.2.8
                              Jan 14, 2025 23:02:22.325684071 CET44550033110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:22.325784922 CET50033445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:22.325845957 CET50033445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:22.325881004 CET50033445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:22.330775023 CET44550033110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:22.330806017 CET44550033110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:22.566724062 CET44550034210.196.38.1192.168.2.8
                              Jan 14, 2025 23:02:22.566817045 CET50034445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:02:22.566893101 CET50034445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:02:22.566971064 CET50034445192.168.2.8210.196.38.1
                              Jan 14, 2025 23:02:22.571692944 CET44550034210.196.38.1192.168.2.8
                              Jan 14, 2025 23:02:22.571804047 CET44550034210.196.38.1192.168.2.8
                              Jan 14, 2025 23:02:22.626544952 CET50113445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:22.698592901 CET44550113210.196.38.2192.168.2.8
                              Jan 14, 2025 23:02:22.698690891 CET50113445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:22.698729992 CET50113445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:22.699067116 CET50115445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:22.714689970 CET44550113210.196.38.2192.168.2.8
                              Jan 14, 2025 23:02:22.714724064 CET44550115210.196.38.2192.168.2.8
                              Jan 14, 2025 23:02:22.714757919 CET50113445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:22.714798927 CET50115445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:22.714828014 CET50115445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:22.722024918 CET44550115210.196.38.2192.168.2.8
                              Jan 14, 2025 23:02:23.376130104 CET50120445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:02:23.381087065 CET44550120105.221.169.1192.168.2.8
                              Jan 14, 2025 23:02:23.381211042 CET50120445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:02:23.381247997 CET50120445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:02:23.388008118 CET44550120105.221.169.1192.168.2.8
                              Jan 14, 2025 23:02:24.253169060 CET44550037128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:24.253253937 CET50037445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:24.253302097 CET50037445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:24.253339052 CET50037445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:24.258963108 CET44550037128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:24.258992910 CET44550037128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:24.595300913 CET44550038124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:24.595416069 CET50038445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:24.595457077 CET50038445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:24.595495939 CET50038445192.168.2.8124.112.153.1
                              Jan 14, 2025 23:02:24.600344896 CET44550038124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:24.600393057 CET44550038124.112.153.1192.168.2.8
                              Jan 14, 2025 23:02:24.657650948 CET50134445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:24.662631989 CET44550134124.112.153.2192.168.2.8
                              Jan 14, 2025 23:02:24.662756920 CET50134445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:24.662894011 CET50134445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:24.663306952 CET50135445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:24.668103933 CET44550134124.112.153.2192.168.2.8
                              Jan 14, 2025 23:02:24.668195009 CET50134445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:24.668211937 CET44550135124.112.153.2192.168.2.8
                              Jan 14, 2025 23:02:24.668273926 CET50135445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:24.668304920 CET50135445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:24.673085928 CET44550135124.112.153.2192.168.2.8
                              Jan 14, 2025 23:02:25.329502106 CET50145445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:25.335005999 CET44550145110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:25.335163116 CET50145445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:25.335299969 CET50145445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:25.340739012 CET44550145110.194.28.1192.168.2.8
                              Jan 14, 2025 23:02:25.997725010 CET44550041181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:25.997929096 CET50041445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:25.997983932 CET50041445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:25.998049021 CET50041445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:26.002969980 CET44550041181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:26.003002882 CET44550041181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:26.595479965 CET4455004280.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:26.595587969 CET50042445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:26.595684052 CET50042445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:26.595812082 CET50042445192.168.2.880.198.199.1
                              Jan 14, 2025 23:02:26.600542068 CET4455004280.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:26.600722075 CET4455004280.198.199.1192.168.2.8
                              Jan 14, 2025 23:02:26.657552004 CET50170445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:26.663885117 CET4455017080.198.199.2192.168.2.8
                              Jan 14, 2025 23:02:26.663984060 CET50170445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:26.664067030 CET50170445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:26.664458990 CET50171445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:26.669256926 CET4455017080.198.199.2192.168.2.8
                              Jan 14, 2025 23:02:26.669291973 CET4455017180.198.199.2192.168.2.8
                              Jan 14, 2025 23:02:26.669337034 CET50170445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:26.669399977 CET50171445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:26.669415951 CET50171445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:26.674233913 CET4455017180.198.199.2192.168.2.8
                              Jan 14, 2025 23:02:27.267193079 CET50187445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:27.272094011 CET44550187128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:27.272195101 CET50187445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:27.272245884 CET50187445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:27.277025938 CET44550187128.83.164.1192.168.2.8
                              Jan 14, 2025 23:02:27.767625093 CET4455004573.163.6.1192.168.2.8
                              Jan 14, 2025 23:02:27.767714024 CET50045445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:27.767750978 CET50045445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:27.767785072 CET50045445192.168.2.873.163.6.1
                              Jan 14, 2025 23:02:27.772727966 CET4455004573.163.6.1192.168.2.8
                              Jan 14, 2025 23:02:27.772762060 CET4455004573.163.6.1192.168.2.8
                              Jan 14, 2025 23:02:28.544985056 CET44550046164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:28.545099974 CET50046445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:28.545125961 CET50046445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:28.545166969 CET50046445192.168.2.8164.80.167.1
                              Jan 14, 2025 23:02:28.550076008 CET44550046164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:28.550107002 CET44550046164.80.167.1192.168.2.8
                              Jan 14, 2025 23:02:28.610690117 CET50229445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:28.615807056 CET44550229164.80.167.2192.168.2.8
                              Jan 14, 2025 23:02:28.615919113 CET50229445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:28.616038084 CET50229445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:28.616297960 CET50230445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:28.621026993 CET44550229164.80.167.2192.168.2.8
                              Jan 14, 2025 23:02:28.621099949 CET50229445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:28.621176958 CET44550230164.80.167.2192.168.2.8
                              Jan 14, 2025 23:02:28.621241093 CET50230445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:28.621258020 CET50230445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:28.626115084 CET44550230164.80.167.2192.168.2.8
                              Jan 14, 2025 23:02:29.001622915 CET50249445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:29.006829023 CET44550249181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:29.006932020 CET50249445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:29.006968021 CET50249445192.168.2.8181.179.19.1
                              Jan 14, 2025 23:02:29.012037039 CET44550249181.179.19.1192.168.2.8
                              Jan 14, 2025 23:02:29.123897076 CET4455004986.93.55.1192.168.2.8
                              Jan 14, 2025 23:02:29.124125004 CET50049445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:29.124171972 CET50049445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:29.124211073 CET50049445192.168.2.886.93.55.1
                              Jan 14, 2025 23:02:29.129086018 CET4455004986.93.55.1192.168.2.8
                              Jan 14, 2025 23:02:29.129139900 CET4455004986.93.55.1192.168.2.8
                              Jan 14, 2025 23:02:30.560475111 CET4455005261.143.77.1192.168.2.8
                              Jan 14, 2025 23:02:30.560559988 CET50052445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:30.637996912 CET4455005330.211.35.1192.168.2.8
                              Jan 14, 2025 23:02:30.638063908 CET50053445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:31.280162096 CET50067445192.168.2.8166.19.84.1
                              Jan 14, 2025 23:02:31.280190945 CET50073445192.168.2.8185.163.186.1
                              Jan 14, 2025 23:02:31.280257940 CET50079445192.168.2.8147.209.87.2
                              Jan 14, 2025 23:02:31.280257940 CET50069445192.168.2.820.51.106.2
                              Jan 14, 2025 23:02:31.280283928 CET50171445192.168.2.880.198.199.2
                              Jan 14, 2025 23:02:31.280303955 CET50104445192.168.2.8208.232.176.1
                              Jan 14, 2025 23:02:31.280322075 CET50089445192.168.2.882.182.10.1
                              Jan 14, 2025 23:02:31.280385971 CET50072445192.168.2.811.159.44.1
                              Jan 14, 2025 23:02:31.280396938 CET50100445192.168.2.8188.147.52.2
                              Jan 14, 2025 23:02:31.280426025 CET50091445192.168.2.8157.200.46.2
                              Jan 14, 2025 23:02:31.280473948 CET50135445192.168.2.8124.112.153.2
                              Jan 14, 2025 23:02:31.280603886 CET50052445192.168.2.861.143.77.1
                              Jan 14, 2025 23:02:31.280648947 CET50053445192.168.2.830.211.35.1
                              Jan 14, 2025 23:02:31.280651093 CET50056445192.168.2.8168.195.221.1
                              Jan 14, 2025 23:02:31.280674934 CET50057445192.168.2.8161.78.168.1
                              Jan 14, 2025 23:02:31.280729055 CET50063445192.168.2.864.155.30.1
                              Jan 14, 2025 23:02:31.280765057 CET50076445192.168.2.816.222.176.1
                              Jan 14, 2025 23:02:31.280829906 CET50060445192.168.2.8198.1.189.1
                              Jan 14, 2025 23:02:31.280829906 CET50082445192.168.2.8107.176.182.1
                              Jan 14, 2025 23:02:31.280857086 CET50083445192.168.2.883.48.178.1
                              Jan 14, 2025 23:02:31.280903101 CET50093445192.168.2.8194.143.231.3
                              Jan 14, 2025 23:02:31.280929089 CET50095445192.168.2.8206.223.88.1
                              Jan 14, 2025 23:02:31.280949116 CET50120445192.168.2.8105.221.169.1
                              Jan 14, 2025 23:02:31.281007051 CET50115445192.168.2.8210.196.38.2
                              Jan 14, 2025 23:02:31.281047106 CET50187445192.168.2.8128.83.164.1
                              Jan 14, 2025 23:02:31.281065941 CET50145445192.168.2.8110.194.28.1
                              Jan 14, 2025 23:02:31.281096935 CET50064445192.168.2.864.73.149.1
                              Jan 14, 2025 23:02:31.281097889 CET50086445192.168.2.8139.172.220.1
                              Jan 14, 2025 23:02:31.281529903 CET50230445192.168.2.8164.80.167.2
                              Jan 14, 2025 23:02:31.281532049 CET50249445192.168.2.8181.179.19.1
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 14, 2025 23:01:24.793008089 CET5740753192.168.2.81.1.1.1
                              Jan 14, 2025 23:01:24.826697111 CET53574071.1.1.1192.168.2.8
                              Jan 14, 2025 23:02:02.802941084 CET138138192.168.2.8192.168.2.255
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 14, 2025 23:01:24.793008089 CET192.168.2.81.1.1.10xc35aStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 14, 2025 23:01:24.826697111 CET1.1.1.1192.168.2.80xc35aNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                              Jan 14, 2025 23:01:24.826697111 CET1.1.1.1192.168.2.80xc35aNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                              • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.849705104.16.167.228802744C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 23:01:24.836764097 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 23:01:25.343739986 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 22:01:25 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 9020e78cfe540f84-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.849706104.16.167.228801160C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 23:01:26.045376062 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 23:01:26.533389091 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 22:01:26 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 9020e7947bf043a7-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.849723104.16.167.228805812C:\Windows\mssecsvc.exe
                              TimestampBytes transferredDirectionData
                              Jan 14, 2025 23:01:27.464159966 CET100OUTGET / HTTP/1.1
                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              Cache-Control: no-cache
                              Jan 14, 2025 23:01:27.955717087 CET778INHTTP/1.1 200 OK
                              Date: Tue, 14 Jan 2025 22:01:27 GMT
                              Content-Type: text/html
                              Content-Length: 607
                              Connection: close
                              Server: cloudflare
                              CF-RAY: 9020e79d4b380f80-EWR
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                              Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:17:01:23
                              Start date:14/01/2025
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll"
                              Imagebase:0x190000
                              File size:126'464 bytes
                              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:1
                              Start time:17:01:23
                              Start date:14/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6ee680000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:17:01:23
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1
                              Imagebase:0xa40000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:17:01:23
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\bopY0ot9wf.dll,PlayGame
                              Imagebase:0x30000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:17:01:23
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",#1
                              Imagebase:0x30000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:6
                              Start time:17:01:23
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:3309B9838FA3B66A046FCA2740D4EE25
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1478097199.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1478097199.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1477966670.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:8
                              Start time:17:01:24
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe -m security
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:3309B9838FA3B66A046FCA2740D4EE25
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1489002654.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2137398178.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2137398178.0000000001EBD000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1489155785.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1489155785.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2137726500.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2137726500.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:9
                              Start time:17:01:25
                              Start date:14/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:68B3F7C2334E7FCB13795D39AA2D5F3E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1502350538.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                              • Rule: Win32_Ransomware_WannaCry, Description: unknown, Source: C:\Windows\tasksche.exe, Author: ReversingLabs
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 100%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:10
                              Start time:17:01:26
                              Start date:14/01/2025
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\bopY0ot9wf.dll",PlayGame
                              Imagebase:0x30000
                              File size:61'440 bytes
                              MD5 hash:889B99C52A60DD49227C5E485A016679
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:11
                              Start time:17:01:26
                              Start date:14/01/2025
                              Path:C:\Windows\mssecsvc.exe
                              Wow64 process (32bit):true
                              Commandline:C:\WINDOWS\mssecsvc.exe
                              Imagebase:0x400000
                              File size:3'723'264 bytes
                              MD5 hash:3309B9838FA3B66A046FCA2740D4EE25
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1506902921.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1517382462.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000000.1507061916.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000000.1507061916.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000B.00000002.1517664610.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000B.00000002.1517664610.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Target ID:12
                              Start time:17:01:27
                              Start date:14/01/2025
                              Path:C:\Windows\tasksche.exe
                              Wow64 process (32bit):false
                              Commandline:C:\WINDOWS\tasksche.exe /i
                              Imagebase:0x400000
                              File size:3'514'368 bytes
                              MD5 hash:68B3F7C2334E7FCB13795D39AA2D5F3E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000002.1516646003.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000C.00000000.1516013290.000000000040E000.00000008.00000001.01000000.00000007.sdmp, Author: us-cert code analysis team
                              Reputation:low
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:71.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:64.9%
                                Total number of Nodes:37
                                Total number of Limit Nodes:9

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                • CreateProcessA.KERNELBASE ref: 00407EE8
                                • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.1503309262.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.1503290419.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503330037.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503400711.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4281112323-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000006.00000002.1503309262.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.1503290419.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503330037.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503400711.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000006.00000002.1503309262.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.1503290419.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503330037.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503400711.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.1503309262.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.1503290419.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503330037.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503400711.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000006.00000002.1503309262.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000006.00000002.1503290419.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503330037.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503350356.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503400711.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000006.00000002.1503507470.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Execution Graph

                                Execution Coverage:34.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:35
                                Total number of Limit Nodes:2

                                Callgraph

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • __p___argc.MSVCRT ref: 004080A5
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6F8D0EF0,00000000,?,004081B2), ref: 004080DC
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.2136257475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000008.00000002.2136234084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136281481.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136380399.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136400974.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                • String ID: mssecsvc2.0
                                • API String ID: 4274534310-3729025388
                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                Control-flow Graph

                                APIs
                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                Strings
                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                                Memory Dump Source
                                • Source File: 00000008.00000002.2136257475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000008.00000002.2136234084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136281481.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136380399.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136400974.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                                • API String ID: 774561529-2942426231
                                • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                Control-flow Graph

                                APIs
                                • sprintf.MSVCRT ref: 00407C56
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F8D0EF0,00000000), ref: 00407C9B
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.2136257475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000008.00000002.2136234084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136281481.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136380399.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136400974.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                                • API String ID: 3340711343-4063779371
                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                APIs
                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F8D0EF0,?,00000000), ref: 00407CEF
                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                • sprintf.MSVCRT ref: 00407E01
                                • sprintf.MSVCRT ref: 00407E18
                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.2136257475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000008.00000002.2136234084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136281481.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136380399.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136400974.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                • API String ID: 4072214828-1507730452
                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.2136257475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000008.00000002.2136234084.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136281481.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136301513.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136352892.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136380399.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136400974.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000828000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000008.00000002.2136533119.0000000000A33000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                • String ID:
                                • API String ID: 801014965-0
                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59
                                APIs
                                • memcpy.MSVCRT(?,?,0000012C,?), ref: 00406C91
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID: /../$/..\$\../$\..\
                                • API String ID: 3510742995-3885502717
                                • Opcode ID: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction ID: 8d35de4500b3f4065ad8a7d009fa2f60231b6be20ed9f01f65d9d1a3966dd706
                                • Opcode Fuzzy Hash: 24419fe79de55b9e050378da4d3ae0875fe08eefc49193e89ac78033597620dd
                                • Instruction Fuzzy Hash: 98D147729082459FDB15CF68C881AEABBF4EF05300F15857FE49AB7381C738A915CB98
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                • GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                • GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                • GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                • GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                • GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CryptAcquireContextA$CryptDecrypt$CryptDestroyKey$CryptEncrypt$CryptGenKey$CryptImportKey$advapi32.dll
                                • API String ID: 2238633743-2459060434
                                • Opcode ID: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction ID: 9aae3444cc52ced5e7e1ad1d2a06d11cf911cb2b3a933a05a08c6ba10b936042
                                • Opcode Fuzzy Hash: b9d8274d123a30a539352919ce36730ce9328d7041a45cd95e79278e35d60e58
                                • Instruction Fuzzy Hash: 20011E32A86311EBDB30AFA5AE856677AE4EA41750368843FB104B2DB1D7F81448DE5C
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00401CFE
                                • OpenServiceA.ADVAPI32(00000000,0040F8AC,000F01FF), ref: 00401D21
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00401D31
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D3A
                                • CloseServiceHandle.ADVAPI32(?), ref: 00401D9E
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$ManagerStart
                                • String ID: cmd.exe /c "%s"
                                • API String ID: 1485051382-955883872
                                • Opcode ID: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction ID: 93977d8af42d47d1d9866270745c8e9c50065656b45fe828c5c40e24baaa5e60
                                • Opcode Fuzzy Hash: 4dc5d8109ff1f89eb2c8b95274d01a87daa9a34efcc40f147da3f0b4c8cffa2a
                                • Instruction Fuzzy Hash: 6411AF71900118BBDB205B659E4CE9FBF7CEF85745F10407AF601F21A0CA744949DB68
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402A95
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402AA4
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402ACD
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402ADC
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(?,?,?,00000000,00000010,?), ref: 00402AFF
                                • _CxxThrowException.MSVCRT(00000010,0040D570,?,00000000,00000010,?), ref: 00402B0E
                                • memcpy.MSVCRT(?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B2A
                                • memcpy.MSVCRT(?,?,?,?,?,00000010,?,?,00000000,00000010,?,?), ref: 00402B3F
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow$memcpy
                                • String ID:
                                • API String ID: 1881450474-3916222277
                                • Opcode ID: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction ID: fcfef073648f46ce18afaeffe4143d5033c2e410e09e17396796de68d512254b
                                • Opcode Fuzzy Hash: 13455132f19fce7ccee5142b200569a1d3dc411a47d032a17fbb22a214c81369
                                • Instruction Fuzzy Hash: 8DD1C3706006099FDB28CF29C5846EA77F5FF48314F14C43EE95AEB281D778AA85CB58
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040150D
                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401529
                                • memcmp.MSVCRT(?,WANACRY!,00000008), ref: 00401572
                                • GlobalAlloc.KERNEL32(00000000,?,?,?,00000010,?,?,?,?), ref: 0040166D
                                • _local_unwind2.MSVCRT(?,000000FF), ref: 004016D6
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalSize_local_unwind2memcmp
                                • String ID: WANACRY!
                                • API String ID: 283026544-1240840912
                                • Opcode ID: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction ID: 23909f9b909e50c20e483d6bc4be6e23e355ec3bf8b0a6de4718622c8bde6caa
                                • Opcode Fuzzy Hash: 3616707767261f84fde6c13708b35c3d4dbb974938da28d5f777545cb9cffa02
                                • Instruction Fuzzy Hash: 6E512C71900209ABDB219F95CD84FEEB7BCEB08790F1444BAF515F21A0D739AA45CB28
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403528
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B51,?,?,?), ref: 00403537
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B51,?,?), ref: 004036A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID: $Q;@
                                • API String ID: 2382887404-262343263
                                • Opcode ID: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction ID: bc36c6e363c45e845c5013d3ee32ff29fee655b638a1b5d52e43d816bbd12583
                                • Opcode Fuzzy Hash: 68433a68c8f87a96c4578501cf6b50a347b0c2ca376bc2ea45e1a632b2ad4c4a
                                • Instruction Fuzzy Hash: A581C3759002499FCB05CF68C9809EEBBF5EF89308F2484AEE595E7352C234BA45CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037B0
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,?,?,00403B9C,?,?,?), ref: 004037BF
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00403B9C,?,?), ref: 00403937
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-3916222277
                                • Opcode ID: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction ID: 1cfba4d829132d5223a2741c68a06c6b284a50eb41fad236877f379c856cacdf
                                • Opcode Fuzzy Hash: f4b5f5b39d3fd1fccf69c885608927ed404fa65085bd71c262b9c8f9e9248758
                                • Instruction Fuzzy Hash: B991C375A002499FCB05CF69C480AEEBBF5FF89315F2480AEE595E7342C234AA45CF58
                                APIs
                                • free.MSVCRT(?,00402198,00000000,00000000,0040243C,00000000), ref: 00402A15
                                • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,0040243C,00000000), ref: 00402A36
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 00402A3D
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$FreeProcessfree
                                • String ID:
                                • API String ID: 3428986607-0
                                • Opcode ID: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction ID: 6307eaad725422957632c7c85bafc458d1caddc7471a2505469f2591130cc2ff
                                • Opcode Fuzzy Hash: 67af2f346d87749f9cdb855264ac8d2816ecbe8db690f3f12af5f99a0e11ec4c
                                • Instruction Fuzzy Hash: C4010C72600A019FCB309FA5DE88967B7E9FF48321354483EF196A2591CB75F841CF58
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402E98
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00403554,00000002,?,?,?,?), ref: 00402EA7
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction ID: 7c46eb61736c4a52f21da4615b0110659747632e7974af7727d2e67ead4b8ec0
                                • Opcode Fuzzy Hash: 0b3a82e1866a10e008d9e23789663a186783f6e7ea65f1ebfadb5e40c8bf56e2
                                • Instruction Fuzzy Hash: 01B1AD75A081D99EDB05CFB989A04EAFFF2AF4E20474ED1E9C5C4AB313C5306505DB98
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031D6
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,?,004037DC,00000002,?,?,?,?), ref: 004031E5
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrow
                                • String ID:
                                • API String ID: 941485209-0
                                • Opcode ID: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction ID: bcf4991698fce177fafabfcfbf4d003d7da0a1e91b0dfae35dbc96c431f9713a
                                • Opcode Fuzzy Hash: 0dda08770b2cfa47ca0284abc8234425fc657ac4a7c18576e4d0461ed08ab4c9
                                • Instruction Fuzzy Hash: 43B1A135A081D99EDB05CFB984A04EAFFF2AF8E200B4ED1E6C9D4AB713C5705615DB84
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction ID: 90343a8667ee0670e87e021bba3e221c8adc0c1da1bb1a76252bfdf766af77e9
                                • Opcode Fuzzy Hash: f98d37e25a52c04dcc5b825836114b3c9bed0208ddb816caf6c63d538b842863
                                • Instruction Fuzzy Hash: FB520CB5900609EFCB14CF69C580AAABBF1FF49315F10852EE95AA7780D338EA55CF44
                                APIs
                                • CryptReleaseContext.ADVAPI32(?,00000000,?,004013DB,?,?,?,0040139D,?,?,00401366), ref: 004018EA
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ContextCryptRelease
                                • String ID:
                                • API String ID: 829835001-0
                                • Opcode ID: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction ID: 2349b07d823645f04250185dd133334db1216db109592f97c32ed3e6f6040a2b
                                • Opcode Fuzzy Hash: 5ecafc68ca33f8cfa3c4e9ed1ded46982a6db61dfcb788b9f393b121ae522fda
                                • Instruction Fuzzy Hash: C7E0ED323147019BEB30AB65ED49B5373E8AF00762F04C83DB05AE6990CBB9E8448A58
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction ID: 9637f4fcf05056c634a246d4ec164b1eccd92df816b65a9601eba7856632ad8a
                                • Opcode Fuzzy Hash: 39bb7c4b20325c44dd8699449145d0d2bc85238f2d0020d1ee85a7bd7e705017
                                • Instruction Fuzzy Hash: 36D1F5B1A002199FDF14CFA9D9805EDBBB1FF88314F25826AD959B7390D734AA41CB84
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction ID: 3f72058ef88e406f14a8e4c5cd972b2546dbbe82ce95f55f9558457d0f17cbf0
                                • Opcode Fuzzy Hash: f53bbad7aeff0a1b6693495eaf2e1723a9e1ea82af51c52fb67f7a2539a612fb
                                • Instruction Fuzzy Hash: 8E31A133E285B207C3249EBA5C4006AF6D2AB4A125B4A8775DE88F7355E128EC96C6D4
                                APIs
                                  • Part of subcall function 00401A45: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00401711), ref: 00401A5A
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptAcquireContextA,?,?,?,00401711), ref: 00401A77
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptImportKey,?,?,?,00401711), ref: 00401A84
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDestroyKey,?,?,?,00401711), ref: 00401A91
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptEncrypt,?,?,?,00401711), ref: 00401A9E
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptDecrypt,?,?,?,00401711), ref: 00401AAB
                                  • Part of subcall function 00401A45: GetProcAddress.KERNEL32(00000000,CryptGenKey,?,?,?,00401711), ref: 00401AB8
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040172C
                                • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00401749
                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00401756
                                • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 00401763
                                • GetProcAddress.KERNEL32(00000000,MoveFileW), ref: 00401770
                                • GetProcAddress.KERNEL32(00000000,MoveFileExW), ref: 0040177D
                                • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040178A
                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00401797
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CloseHandle$CreateFileW$DeleteFileW$MoveFileExW$MoveFileW$ReadFile$WriteFile$kernel32.dll
                                • API String ID: 2238633743-1294736154
                                • Opcode ID: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction ID: c344c10c919c95db3ecd10b94979b50738023765c799e55a58251b06a1d00095
                                • Opcode Fuzzy Hash: 39239a652de09aa7f9a0fc3aed99621d6525255b515761ed1c17c464bdaba5bf
                                • Instruction Fuzzy Hash: D9118E729003059ACB30BF73AE84A577AF8A644751B64483FE501B3EF0D77894499E1E
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: %s%s$%s%s%s$:$\
                                • API String ID: 0-1100577047
                                • Opcode ID: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction ID: 622825bbce38b7500016b977d00db7372d85e5c8e1565b3adbba59f792ee02a2
                                • Opcode Fuzzy Hash: fa5f8851d26bf09fdef4e4f1c55e900ad1a47778409aa7a1c0108d1ccba85c9d
                                • Instruction Fuzzy Hash: 42A12A31C082049BDB319F14CC44BEA7BA9AB01314F2445BFF895B62D1D73DBA95CB5A
                                APIs
                                • __p___argv.MSVCRT(0040F538), ref: 00402040
                                • strcmp.MSVCRT(?), ref: 0040204B
                                • CopyFileA.KERNEL32(?,tasksche.exe), ref: 0040206F
                                • GetFileAttributesA.KERNEL32(tasksche.exe), ref: 00402076
                                  • Part of subcall function 00401F5D: GetFullPathNameA.KERNEL32(tasksche.exe,00000208,?,00000000), ref: 00401F97
                                • strrchr.MSVCRT(?,0000005C,?,?,00000000), ref: 0040209D
                                • strrchr.MSVCRT(?,0000005C), ref: 004020AE
                                • SetCurrentDirectoryA.KERNEL32(?,00000000), ref: 004020BB
                                  • Part of subcall function 00401B5F: MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                  • Part of subcall function 00401B5F: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                  • Part of subcall function 00401B5F: swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                  • Part of subcall function 00401B5F: GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesDirectorystrrchr$ByteCharCopyCurrentFullMultiNamePathWideWindows__p___argvstrcmpswprintf
                                • String ID: TaskStart$attrib +h .$icacls . /grant Everyone:F /T /C /Q$t.wnry$tasksche.exe
                                • API String ID: 1074704982-2844324180
                                • Opcode ID: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction ID: 0f1cc1f94130967d107883c1ee7151828ebb686b55f89e1ef1b9593e139f0a32
                                • Opcode Fuzzy Hash: 89895d8f6934e01f58802458fd3b58e20f5d1862df0252ba7c7124bca42d23be
                                • Instruction Fuzzy Hash: 25318172500319AEDB24B7B19E89E9F376C9F10319F20057FF645F65E2DE788D488A28
                                APIs
                                • wcscat.MSVCRT(?,WanaCrypt0r,?,0000DDB6), ref: 0040114B
                                • RegCreateKeyW.ADVAPI32(80000001,?,00000000), ref: 0040117A
                                • GetCurrentDirectoryA.KERNEL32(00000207,?), ref: 0040119A
                                • strlen.MSVCRT(?), ref: 004011A7
                                • RegSetValueExA.ADVAPI32(00000000,0040E030,00000000,00000001,?,00000001), ref: 004011BD
                                • RegQueryValueExA.ADVAPI32(00000000,0040E030,00000000,00000000,?,?), ref: 004011E4
                                • SetCurrentDirectoryA.KERNEL32(?), ref: 004011FA
                                • RegCloseKey.ADVAPI32(00000000), ref: 00401203
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentDirectoryValue$CloseCreateQuerystrlenwcscat
                                • String ID: 0@$Software\$WanaCrypt0r
                                • API String ID: 865909632-3421300005
                                • Opcode ID: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction ID: 752dd9e6153134350df00ddc45e524be7a8e60cbe47ba2191db59f61a0b32c4f
                                • Opcode Fuzzy Hash: be197859f140e0a5161343930b87c84f9738d6a9d10ac2d583ef225433aeadb0
                                • Instruction Fuzzy Hash: 09316232801228EBDB218B90DD09BDEBB78EB44751F1140BBE645F6190CB745E84CBA8
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F8AC,000000FF,?,00000063), ref: 00401BCA
                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00401BDD
                                • swprintf.MSVCRT(?,%s\ProgramData,?), ref: 00401C04
                                • GetFileAttributesW.KERNEL32(?), ref: 00401C10
                                • swprintf.MSVCRT(?,%s\Intel,?), ref: 00401C53
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00401C97
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CAC
                                • wcsrchr.MSVCRT(?,0000005C), ref: 00401CBD
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                  • Part of subcall function 00401AF6: CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                  • Part of subcall function 00401AF6: SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$CreateCurrentswprintfwcsrchr$AttributesByteCharFileMultiPathTempWideWindows
                                • String ID: %s\Intel$%s\ProgramData
                                • API String ID: 3806094219-198707228
                                • Opcode ID: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction ID: 4ac525b1174630586dc3f01422198d44c3eaba501bd80531e66e43f198221a67
                                • Opcode Fuzzy Hash: e04e666ac5ff563214b472014ed4c30e25de200c4a7bf1775954a8b15fda063a
                                • Instruction Fuzzy Hash: 2C41447294021DAAEF609BA0DD45FDA777CAF04310F1045BBE608F71E0EA74DA888F59
                                APIs
                                  • Part of subcall function 00402457: SetLastError.KERNEL32(0000000D,00402200,?!@,00000040,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402463
                                • SetLastError.KERNEL32(000000C1,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402219
                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0000DDB6,?,00402185,0040216E,00402185,00402198,004021A3,004021B2,00000000,0040213F,00000000), ref: 00402291
                                • GetProcessHeap.KERNEL32(00000008,0000003C,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2), ref: 00402313
                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3,004021B2,00000000), ref: 0040231A
                                • memcpy.MSVCRT(00000000,?,8328EC83,?,?,?,?,?,?,?,?,?,?,00402185,00402198,004021A3), ref: 004023A7
                                  • Part of subcall function 00402470: memset.MSVCRT(?,00000000,?), ref: 004024D5
                                • SetLastError.KERNEL32(0000045A), ref: 00402430
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$Heap$AllocHandleModuleProcessmemcpymemset
                                • String ID: ?!@$GetNativeSystemInfo$kernel32.dll
                                • API String ID: 1900561814-3657104962
                                • Opcode ID: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction ID: 3b750285519b5b92c664dbe57bf04ddc7e4262fbacbc213f0015b22f99412f1c
                                • Opcode Fuzzy Hash: 0e24c0e50799aa35dd9f5fcc36a4565fcb8133d83dc7aa1daf15d2422d00f892
                                • Instruction Fuzzy Hash: 0A81AD71A01602AFDB209FA5CE49AAB77E4BF08314F10443EF945E76D1D7B8E851CB98
                                APIs
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B07
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B12
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401B1E
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00401B21
                                • GetFileAttributesW.KERNEL32(?), ref: 00401B2C
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00401B36
                                • swprintf.MSVCRT(?,%s\%s,?,?), ref: 00401B4E
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Directory$AttributesCreateCurrentFile$swprintf
                                • String ID: %s\%s
                                • API String ID: 1036847564-4073750446
                                • Opcode ID: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction ID: 4a0a9b6f0974b2b783bf1fd4f993800d593798a72c4fd06372b86497b3864b36
                                • Opcode Fuzzy Hash: e8d223ccc4edc92c4536f1ca202ba6161fd040db7272db682552e70b0b18d917
                                • Instruction Fuzzy Hash: 99F06271200208BBEB103F65DE44F9B3B2CEB457A5F015832FA46B61A1DB75A855CAB8
                                APIs
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004010A8
                                • WaitForSingleObject.KERNEL32(?,?), ref: 004010BD
                                • TerminateProcess.KERNEL32(?,000000FF), ref: 004010CC
                                • GetExitCodeProcess.KERNEL32(?,?), ref: 004010DD
                                • CloseHandle.KERNEL32(?), ref: 004010EC
                                • CloseHandle.KERNEL32(?), ref: 004010F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandle$CodeCreateExitObjectSingleTerminateWait
                                • String ID: D
                                • API String ID: 786732093-2746444292
                                • Opcode ID: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction ID: fabf2a0aaa91e867d54492d1ca24e81fc8ed090543e33b3e61fa812da4358066
                                • Opcode Fuzzy Hash: 520ef4afec62fe4405832db260c3c6b21caa087d375fb1c1d919acb3a27097cb
                                • Instruction Fuzzy Hash: 8D116431900229ABDB218F9ADD04ADFBF79FF04720F008426F514B65A0DB708A18DAA8
                                APIs
                                • __set_app_type.MSVCRT(00000002), ref: 004077E7
                                • __p__fmode.MSVCRT ref: 004077FC
                                • __p__commode.MSVCRT ref: 0040780A
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type
                                • String ID:
                                • API String ID: 3626615345-0
                                • Opcode ID: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction ID: 63d29f1c4e41429a3497612c8de1f509d91e94429ea3a2aefb8dc74a018e4fb3
                                • Opcode Fuzzy Hash: bfbd7971593811c7fff28e35bb39fa0d644f96314b868f8e424e213b276a966c
                                • Instruction Fuzzy Hash: 51318BB1D04344AFDB20AFA5DE49F5A7BA8BB05710F10463EF541B72E0CB786805CB59
                                APIs
                                • __setusermatherr.MSVCRT(0040793C), ref: 00407836
                                  • Part of subcall function 0040792A: _controlfp.MSVCRT(00010000,00030000,00407842), ref: 00407934
                                • _initterm.MSVCRT(0040E008,0040E00C), ref: 0040784C
                                • __getmainargs.MSVCRT(?,?,?,?,0040E008,0040E00C), ref: 0040786F
                                • _initterm.MSVCRT(0040E000,0040E004), ref: 0040787F
                                • GetStartupInfoA.KERNEL32(?), ref: 004078BE
                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004078E2
                                • exit.MSVCRT(00000000,00000000,?,?,?,?), ref: 004078F2
                                • _XcptFilter.MSVCRT(?,?,?,?,?,?), ref: 00407904
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__setusermatherr_controlfpexit
                                • String ID:
                                • API String ID: 2141228402-0
                                • Opcode ID: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction ID: 738ed170af38765147f9c33b7b7214e7a7d60aeb9597ff7827fffae83538cc25
                                • Opcode Fuzzy Hash: e2abdc3946810ebb19c889ba728617f0f692a6676515e3c370649a79fa0f1872
                                • Instruction Fuzzy Hash: F52135B2C04258AEEB20AFA5DD48AAD7BB8AF05304F24443FF581B7291D7786841CB59
                                APIs
                                • IsBadReadPtr.KERNEL32(00000000,00000014,00000000,00000001,00000000,?!@,004023F5,00000000), ref: 00402812
                                • realloc.MSVCRT(85000001,317459C0), ref: 00402854
                                • IsBadReadPtr.KERNEL32(-00000014,00000014), ref: 004028DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: Read$realloc
                                • String ID: ?!@
                                • API String ID: 1241503663-708128716
                                • Opcode ID: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction ID: b911edbb3638e6438919fa35cb7379f64586f657f287b8edbc273cd359ebb62a
                                • Opcode Fuzzy Hash: 3ef8fdaf83090ca6dd9f312f51019f46009b35537f3f51f7116a8d4e5983476b
                                • Instruction Fuzzy Hash: 4841AE76A00205EFDB109F55CE49B5ABBF4FF44310F24803AE846B62D1D7B8E900DB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: rand$wcslen$ComputerNamesrand
                                • String ID:
                                • API String ID: 3058258771-0
                                • Opcode ID: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction ID: 153b78e0bdef4b648922335b0398b7079fc1e42e5dbb3c53d325bf346215f47a
                                • Opcode Fuzzy Hash: b0791ced207a07d975efd615d75f91e7379ad7fc4ff6fb2c179a53625b9ec986
                                • Instruction Fuzzy Hash: FA212833A00318ABD7119B65ED81BDD77A8EB45354F1100BBF948F71C0CA759EC28BA8
                                APIs
                                • GetFileAttributesA.KERNEL32(?,?,?), ref: 00407083
                                • CreateDirectoryA.KERNEL32(?,00000000), ref: 00407091
                                • memcpy.MSVCRT(?,0000002F,0000002F,?,?,?), ref: 004070CA
                                • strcpy.MSVCRT(00000000,?,?,?), ref: 004070FB
                                • strcat.MSVCRT(00000000,0000002F,?,?), ref: 0040710A
                                • GetFileAttributesA.KERNEL32(00000000,?,?), ref: 00407118
                                • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0040712C
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesCreateDirectoryFile$memcpystrcatstrcpy
                                • String ID:
                                • API String ID: 2935503933-0
                                • Opcode ID: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction ID: 50ba023859918e707bf45bf33fbe73a6a33da9a39eec2eddc6b78618a8cc3524
                                • Opcode Fuzzy Hash: 0838382564994867704b48d197d9141456e9ef10b941a736ac2fad3accdc9566
                                • Instruction Fuzzy Hash: 1A112B72C0821456CB305B749D88FD7776C9B11320F1403BBE595B32C2DA78BD898669
                                APIs
                                • sprintf.MSVCRT(?,%s%d,Global\MsWinZonesCacheCounterMutexA,00000000), ref: 00401F16
                                • OpenMutexA.KERNEL32(00100000,00000001,?), ref: 00401F31
                                • Sleep.KERNEL32(000003E8), ref: 00401F40
                                • CloseHandle.KERNEL32(00000000), ref: 00401F52
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandleMutexOpenSleepsprintf
                                • String ID: %s%d$Global\MsWinZonesCacheCounterMutexA
                                • API String ID: 2780352083-2959021817
                                • Opcode ID: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction ID: f4a3b48a0bafa41ae68b0177be176e29d76f271436d11399ade0a1af8f7a19ee
                                • Opcode Fuzzy Hash: d195781efe0b704a0c45d33d3827b966fde6c598e7eccee7cfdb972a19423a06
                                • Instruction Fuzzy Hash: 92F0E931A40305BBDB20EBA49E4AB9B7758AB04B40F104036F945FA0D2DBB8D54586D8
                                APIs
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F570,?,?,?,?,?,00000001), ref: 00403A91
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403AA0
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B00
                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403B68
                                • ??0exception@@QAE@ABQBD@Z.MSVCRT(0040F574,?,?,?,?,?,00000001), ref: 00403BC2
                                • _CxxThrowException.MSVCRT(?,0040D570,?,?,?,?,00000001), ref: 00403BD1
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??0exception@@ExceptionThrowmemcpy
                                • String ID:
                                • API String ID: 2382887404-0
                                • Opcode ID: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction ID: 9805a50700f74263afb1320d00d27f30e93ca80038ec105a2d2f515762341bf2
                                • Opcode Fuzzy Hash: 8f0cb0103d3614fdc28d84a5f541c19cbd02f6e6265a1098423f4cf3f0921468
                                • Instruction Fuzzy Hash: 8541C870B40206ABDB14DE65DD81D9B77BEEB84309B00443FF815B3281D778AB15C759
                                APIs
                                • fopen.MSVCRT(c.wnry,0040E018), ref: 0040101B
                                • fread.MSVCRT(?,0000030C,00000001,00000000), ref: 0040103F
                                • fwrite.MSVCRT(?,0000030C,00000001,00000000), ref: 00401047
                                • fclose.MSVCRT(00000000), ref: 00401058
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: fclosefopenfreadfwrite
                                • String ID: c.wnry
                                • API String ID: 4000964834-3240288721
                                • Opcode ID: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction ID: 4fc4ee2583eead98f325da0eb4a8e2a7a7827d82b7f69226d67b1691b23a23d5
                                • Opcode Fuzzy Hash: 83356dae967f3845aa64eafaf8b7e6f79fd4dc7784855bee587f11601882f661
                                • Instruction Fuzzy Hash: 0CF05931204260ABCA301F656D4AA277B10DBC4F61F10083FF1C1F40E2CABD44C296BE
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040193A
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 0040194A
                                • GlobalAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401448,?), ref: 00401964
                                • ReadFile.KERNEL32(000000FF,00000000,00000000,?,00000000,?,?,?,?,?,?,00401448,?), ref: 0040197D
                                • _local_unwind2.MSVCRT(?,000000FF,?,?,?,?,?,?,00401448,?), ref: 004019A6
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AllocCreateGlobalReadSize_local_unwind2
                                • String ID:
                                • API String ID: 2811923685-0
                                • Opcode ID: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction ID: fb063a64e2dc49fc25d010f75d45645ced701e765f932c996de96a45c5b9f027
                                • Opcode Fuzzy Hash: 232dc3714e51fefb2f6fb0f5b065eea7eb2b0009f41f45388587d49ab84ddf28
                                • Instruction Fuzzy Hash: B62160B1901624AFCB209B99CD48FDF7E78EB097B0F54022AF525B22E0D7785805C6AC
                                APIs
                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001), ref: 00405BFE
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000), ref: 00405C29
                                • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA,00000000,004020D5,?), ref: 00405C38
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000140,?,00406C12,00000000,00401DFE,00000001,00000000,004074EA), ref: 00405C8A
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Pointer$??2@Create
                                • String ID:
                                • API String ID: 1331958074-0
                                • Opcode ID: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction ID: 771dcc1d5a31089dd4cc2aab62cbbe5a226dda330bf0289da8f54b52fc8588cb
                                • Opcode Fuzzy Hash: ff1e72f22e15843ade9ace39703012fff21b8a1e8b9c48cc3c9963cb15211f94
                                • Instruction Fuzzy Hash: 0831F231008784AFDB318F28888479BBBF4EF15350F18896EF491A7380C375AD85CB69
                                APIs
                                • _stricmp.MSVCRT(P!@,?,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 00402989
                                • SetLastError.KERNEL32(0000007F,?,0000DDB6,?,?,?,00402150,00000000,TaskStart), ref: 004029A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_stricmp
                                • String ID: P!@
                                • API String ID: 1278613211-1774101457
                                • Opcode ID: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction ID: aaf1e2d36ba78ebe43aa6e6aad127835d86855a49192f4e92224227a9dbc2408
                                • Opcode Fuzzy Hash: 03c3627be8870cecb91afdd38bef801573c0f783d9791e09bb9b18ce57a97af9
                                • Instruction Fuzzy Hash: 432180B1700605EFDB14CF19DA8486A73F6EF89310B29857AE846EB381D678ED41CB85
                                APIs
                                • strcmp.MSVCRT(?,c.wnry,?,00000000,?), ref: 00401E5B
                                • GetFileAttributesA.KERNEL32(?), ref: 00401E6E
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFilestrcmp
                                • String ID: c.wnry
                                • API String ID: 3324900478-3240288721
                                • Opcode ID: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction ID: 6f95607eaad4b3b0c5796a2914108af7bfa48759f01996e65d2c9759274caab0
                                • Opcode Fuzzy Hash: cc95b26050e750b8ddedfaa82b6fbbed5bde767aecf08ad1744914d0cf1c8067
                                • Instruction Fuzzy Hash: 3001C872D041142ADB209625DC41FEF336C9B45374F1005B7FA44F11C1E739AA998ADA
                                APIs
                                • CloseHandle.KERNEL32(?,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CB6
                                • ??3@YAXPAX@Z.MSVCRT(00000000,$l@,00406118,$l@,?,00000000,00000000), ref: 00405CBD
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: ??3@CloseHandle
                                • String ID: $l@
                                • API String ID: 3816424416-2140230165
                                • Opcode ID: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction ID: 673c02d0cae411eac5e44946f87937de45fd09569792d44698d585129e0307c2
                                • Opcode Fuzzy Hash: 95d67fc171dea6c803f2538cd8e9bf2129e8d776d8110548eb6437a9e23f5d7b
                                • Instruction Fuzzy Hash: 47D05E3280DE211BE7226A28B90469B2B949F01330F054A6EE4A1A25E2D7789C8596CC
                                APIs
                                • EnterCriticalSection.KERNEL32(?,00000000,?,?,00401642,?,?,?,?), ref: 004019F2
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A13
                                • LeaveCriticalSection.KERNEL32(?,?,?,00401642,?,?,?,?), ref: 00401A1D
                                • memcpy.MSVCRT(?,?,?,?,?,00401642,?,?,?,?), ref: 00401A2C
                                Memory Dump Source
                                • Source File: 00000009.00000002.1502832945.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000009.00000002.1502811820.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502856981.0000000000408000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502877246.000000000040E000.00000008.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000410000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000518000.00000002.00000001.01000000.00000007.sdmpDownload File
                                • Associated: 00000009.00000002.1502901055.0000000000723000.00000002.00000001.01000000.00000007.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_400000_tasksche.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$Leave$Entermemcpy
                                • String ID:
                                • API String ID: 3435569088-0
                                • Opcode ID: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction ID: 582611ac2dab466912340a9d1f37a03f8b1d3421f3d1388c7c0078807ea36f1a
                                • Opcode Fuzzy Hash: fd5125ef58b43d2b94afe930c36afa05085028d191ff952fa05313044055aa85
                                • Instruction Fuzzy Hash: 7FF0A432200204FFEB119F90DD05FAA3769EF44710F008439F945AA1A0D7B5A854DB65